network vulnerability

Results 1 - 25 of 50Sort Results By: Published Date | Title | Company Name
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
     Illusive Networks
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : rdns, dns, anti-virus, security, network defense
     Akamai Technologies
By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
     IBM APAC
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Qualys     Published Date: Feb 22, 2010
This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.
Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
     Qualys
By: Qualys     Published Date: Jul 20, 2012
Vulnerabilities are very common nowadays. Even being a safest network does not mean that it cannot be compromised. It's how you handle these vulnerability and flaws and rectify the issues. In order help the security engineers Qualys, Inc. pioneer security brings free guide on Top 10 reports for Managing Vulnerability. This paper cuts through the data overload generated by some vulnerability detection solutions.
Tags : technology, security, vulnerabilities, internet, virus, solutions, business technology, research
     Qualys
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : mobile, security, technology, deployment, enterprise, crow sourced, intelligence
     Symantec
By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, security
     GFI Software
By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : security, network security, enterprise, infrastructure, best practices, vulnerability
     HP - Enterprise
By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security, it management, data management, business technology, data center
     McAfee
By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem, mcafee security innovation alliance, security, data management, business technology, data center
     McAfee
By: Amazon Web Services     Published Date: Apr 11, 2018
Effectively monitoring and managing cloud infrastructure configuration changes and performing on-going vulnerability analyses through forensics, troubleshooting, audits, and automation are key activities to help secure your AWS environment.
Tags : 
     Amazon Web Services
By: GFI Software     Published Date: Mar 21, 2011
Read about the benefits of GFI LANguard, an award-winning solution used by thousands of customers that allows you to scan, detect, assess and rectify security vulnerabilities on your network and to secure it with minimal administrative effort.
Tags : gfi, network scanner, vulnerability management, patch management
     GFI Software
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com