defense

Results 51 - 75 of 423Sort Results By: Published Date | Title | Company Name
Published By: Dyn     Published Date: Oct 04, 2016
Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection
Tags : 
ddos, dns, cdn, attacks
    
Dyn
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Cisco     Published Date: Oct 08, 2018
Detect attacks that get past perimeter defenses across the digital business. Detect malicious patterns in encrypted traffic. No decryption is needed with our Encrypted Traffic Analytics technology and multilayer machine learning. Extend your network visibility.
Tags : 
encrypted traffic, digital business, security, network, network visibility, next generation firewall, digital transformation, advanced malware protection
    
Cisco
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud
    
Blue Coat Systems UK
Published By: Cisco     Published Date: Sep 16, 2015
Internet of Everything is driving transformation.
Tags : 
transformation, network, dod
    
Cisco
Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats, fraud protection, email security, security threats, phishing, networking, security, it management, data management, business technology, data center, data security
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors – And How To Fix Them Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t part of an organization’s core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
    
Akamai Technologies
Published By: illusive networks     Published Date: May 18, 2016
Today's cyber attackers are more specialized, targeted and innovative when it comes to seeking new attack vectors and circumventing perimeter defenses and old-school honeypot traps. Download this whitepaper and learn why Honeypots fail in comparison to Deceptions Everywhere™ Technology, how to mimic real-world scenarios to catch cyber attackers, and leveraging deception technology to combat modern APTs.
Tags : 
    
illusive networks
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies
Published By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, “The Five Essential Capabilities of an Analytics-Driven SOC”, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunk’s, are needed to prevent, detect and respond to attacks in today’s security landscape
Tags : 
    
Splunk
Published By: Gigamon     Published Date: Dec 13, 2018
Despite increasing security budgets, companies find there is too much data for new tools to analyze, not enough skilled IT security professionals and little confidence in current technology investments. Read the “2018 Cyberthreat Defense Report” to learn how your peers are managing increased breaches, vulnerabilities and encrypted traffic. How does your cyberthreat approach compare to other security pros who are protecting their organizations? Learn now.
Tags : 
    
Gigamon
Published By: McAfee     Published Date: May 07, 2014
A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.
Tags : 
    
McAfee
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The manufacturing landscape faces dramatic change. Creating and capturing value in this new environment requires aerospace companies to not just understand what’s driving these changes, but also grasp just how consequential a role digital transformation will play in determining their future. Download this white paper now to find out how the manufacturing landscape faces dramatic change.
Tags : 
aerospace, aviation, manufacturing, product development, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The business models of Aerospace and Defense manufacturers often derive revenue from a number of sources including aircraft and completions as well as aftermarket business. The shop floor affects two of these key sources of revenue. In order to grow the business organically, while maintaining margins, the enterprise needs to deliver more, through the implementation of unprecedented levels of flexible production. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The view ahead for the aerospace and defense industry shows us growth and change. Air traffic has been following a pattern of steady increase that calls for larger aircraft fleets. At the same time, OEMs and suppliers are under mounting pressure to simplify processes, reduce costs and move products to market more quickly – while remaining in compliance with changing environmental regulations. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Sep 28, 2017
This webinar reveals the changes the Aerospace and Defense landscape has experienced recently. Watch this video now to find out how to: • Innovate with Flat Budgets • Master the growing Complexity of Programs • Evolve your Work Force • Achieve record setting production rates View this webinar now to find out more.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Sep 26, 2017
This webinar explains what the Factory of the Future could be like and how to connect all techonologies used. Learn how to create experiences that people can really leverage and become more efficient in the Aerospace and Defense landscape. View this webinar now to find out more.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: Arbor     Published Date: Sep 15, 2014
Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar
Tags : 
security analytics, it security, cyber defenses
    
Arbor
Published By: Arbor     Published Date: Sep 17, 2014
Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables
Tags : 
firewall, firewall protection, it security, cyber defense, security, it management
    
Arbor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com