effective security

Results 176 - 200 of 291Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
     Intel Security
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether it’s speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Kaspersky     Published Date: Feb 05, 2015
This paper reveals how important is effective security software for banking threats.
Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks
     Kaspersky
By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
     KPMG
By: Lookout     Published Date: Sep 25, 2017
A report from CERT-UK and Lookout Mobile Security Mobile malware is increasingly sophisticated and as such presents a growing threat to organisations as well as consumers. The volume of malware targeting mobile devices in the UK quadrupled in 2015, with Q1 2016 already reaching 50% of 2015 numbers. Read the whitepaper to learn what factors must be accounted for to make effective mobile security policies.
Tags : 
     Lookout
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
     Lookout
By: Lumension     Published Date: Mar 29, 2011
Download this Lumension white paper from Web Buyer's Guide to learn more about a new intelligent approach to application whitelisting.
Tags : lumension, whitelisting, business intelligence, deployment, malware, automated patch management, security
     Lumension
By: Lumension     Published Date: Jan 25, 2012
This white paper presents five very effective ways to improve data security in a cost-effective manner.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Sep 18, 2012
The True Cost of AV | How to Ensure More Effective and Efficient Endpoint Security
Tags : intelligent white listing, cost, anti-virus, business technology
     Lumension
By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : anti-virus, security, application, management, patch
     Lumension
By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management
     Lumension
By: M86 Security     Published Date: Dec 01, 2010
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement
     M86 Security
By: M86 Security     Published Date: Feb 09, 2011
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement
     M86 Security
By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring
     McAfee
By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategies—particularly related to threat mitigation, embracing trends, and aligning with business priorities—these five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
     McAfee
By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network survival, network security management, best practices, firewalls, hacker detection
     McAfee
By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
     McAfee
By: McAfee EMEA     Published Date: Nov 15, 2017
To ensure fast, efficient, and comprehensive remediation of breaches, IT security decision makers have acknowledged the need to reduce the complexity of their endpoint security environments. Today’s enterprises value integrated endpoint security solutions that can effectively handle the whole process of endpoint security, including attack prevention, detection, and remediation. Single-vendor suite solutions and cloud technologies are on the rise due to their perceived benefits, including simplicity, lower costs, and better integrated coverage across platforms.
Tags : endpoint, efficiency, security, prevention, technology, decision makers
     McAfee EMEA
By: Microsoft Azure     Published Date: Apr 05, 2018
Even when you’re confident that a move to the cloud is good for your business, it’s natural to have questions and concerns about making the change. After all, if your business is running effectively with on-site technology, you’ll likely want to learn more about the security and payoffs from a cloud-based suite of tools before taking the next step.
Tags : 
     Microsoft Azure
By: Microsoft Azure     Published Date: Apr 11, 2018
While it’s clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. You’ll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
     Microsoft Azure
By: Microsoft Office 365     Published Date: Jun 03, 2016
Did you know that just like email, video conferencing is susceptible to security risks? Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to: Save on security, risk, and compliance costs Reduce risk with a comprehensive solution Simplify your IT environment and increase security *For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.
Tags : 
     Microsoft Office 365
By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
     Mimecast
By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : mimecast, email. esra, email security, cloud security
     Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com