security data

Results 226 - 250 of 1621Sort Results By: Published Date | Title | Company Name
By: Gigamon EMEA     Published Date: Feb 20, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
     Gigamon EMEA
By: Gigamon EMEA     Published Date: Feb 20, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
     Gigamon EMEA
By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe, storage
     CA Mainframe
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: F5 Networks Inc     Published Date: Oct 19, 2012
Private cloud computing can better align IT with business concerns by making IT efficient, responsive, and cost-effective. Learn how to start your private cloud with automation and orchestration to gain operational efficiency and financial benefits.
Tags : private cloud, cloud automation, cloud orchestration, cloud security, secure cloud computing, applications in the cloud, data in the cloud, scalable private cloud, business technology
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall, business technology
     F5 Networks Inc
By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
     LogLogic
By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
     Viavi Solutions
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: CA Technologies     Published Date: Jul 13, 2015
It’s not exactly breaking news that cardholder security is front and center of the payments ecosystem “to do” list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of fraud are increasing, and it becomes harder to authenticate the user.
Tags : 3d secure, ca technologies, mobile, data management
     CA Technologies
By: NetApp     Published Date: Nov 13, 2017
Your MS Office 365 data might not be as safe as think. Read the ebook and learn about the 4 steps to improve the security of your MS Office 365 data.
Tags : 
     NetApp
By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
     MobileIron
By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
     MobileIron
By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
     MobileIron
By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : network security, security breaches, pci, dss, hippa
     Brother
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
     VMware AirWatch
By: Palo Alto Networks     Published Date: Feb 24, 2016
Automation in Network Security Management
Tags : palo alto, network security, data, threat, security, business technology
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Feb 24, 2016
Attackers are more sophisticated than ever
Tags : palo alto, cyber security, data, security organization, security
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Feb 24, 2016
Next generation security for financial services.
Tags : palo alto, financial services, cyber security, data security, security
     Palo Alto Networks
By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : healthcare, information security, web security, data management, technology, cloud services, security
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : web security, healthcare, network management, security, cyberattack prevention, best practices
     Akamai Technologies
By: Oracle ODA     Published Date: Dec 06, 2016
IT leaders must consider new approaches to database administration, implementation, and security, including proactive management, to reduce time-consuming administrative tasks. This, in turn, will free them to develop strategies for capitalizing on the new data-driven initiatives that can help transform the enterprise. Learn more about these opportunities as well as how products, such as an integrated Database Appliance, can streamline the management of these tasks, while reducing costs and time.
Tags : 
     Oracle ODA
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
     CA Technologies
By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
     Citrix ShareFile
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com