security technology

Results 301 - 325 of 412Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jan 10, 2013
In this guide, we will examine major types of threats to information security that  businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : shortcut, business, security measures, ssl, security socket layer, ssl, data management, business technology, data center
     Symantec
By: Trend Micro     Published Date: Oct 12, 2012
Download this free white paper to learn exactly what you need to avoid any trouble without sacrificing innovation or impeding the progress of your business today and in the future.
Tags : cloud computing, information security, information technology, trend micro, security, business technology
     Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
See which security solution is the fastest and most efficient in this FREE analysis
Tags : ation security, information technology, trend micro, security, business technology
     Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
Learn how agentless security architectures can maintain a high level of security while lowering costs
Tags : information security, information technology, protection, security, business technology
     Trend Micro
By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
     Q1 Labs
By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Anti-virus software is a crucial piece of any organization’s security strategy. However, sifting through the marketing hype and finding the product that truly delivers the best security can be challenging. This independent research report on enterprise anti-virus protection tests five of today’s best-known anti-malware products to help your organization evaluate which would work best in your enterprise. View now to uncover who came out on top when tested upon accuracy, protection, false positives, and more.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Symantec Positioned as a Leader in Independent Research Firm Report Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester Wave™: Endpoint Security, Q1 2013 and “remains a good choice” in the endpoint security space. For insight on selecting the right partner to tackle endpoint security challenges, access the full report.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Symantec Endpoint Protection 12 positioned as a Leader in 2013 Gartner’s Magic Quadrant Symantec Endpoint Protection 12 and Critical System Protection are positioned highest in Gartner’s Magic Quadrant for completeness of vision and the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
PassMark Software conducted objective performance testing on six Enterprise Endpoint Security products. Benchmarking was performed using sixteen performance metrics to assess product performance and system impact on the endpoint or client machine. Download the report to find out results from these performance tests. Download Now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. agentless and agent-based solutions from competing vendors. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning functions, and during distributed virus definition updates.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. The malware test used samples for real-world threats, false-positives, and remediation. Download the report to find out how each of the security solution performed. Download Now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
     Symantec
By: Symantec     Published Date: Aug 12, 2013
Symantec has been positioned as a Leader in Gartner Magic Quadrant for Secure Email Gateways. Gartner is the world's leading information technology research and advisory company. Vendors in the Magic Quadrant are evaluated based on ability to execute and completeness of vision. Read Gartner's Magic Quadrant for Secure Email Gateways to learn more about why Symantec is positioned as a leader.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology, knowledge management, business technology
     Symantec
By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
     Damballa
By: Cisco     Published Date: Aug 18, 2014
IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : ucs, scope, cisco, security, compliance, servers, data, innovative, data center, architecture, performance, processors, blade, equipment
     Cisco
By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : alienvault, security, soc, hacking, threat detection
     AlienVault
By: AlienVault     Published Date: Nov 10, 2015
Changing security landscape.
Tags : managment, security, data, technical comparison, siem technology
     AlienVault
By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : web security, web threats, ssl, secure sockets layer, technology, solution, security, business technology
     GeoTrust
By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
     GeoTrust
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com