threat environment

Results 1 - 25 of 101Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
     Cisco Umbrella EMEA
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
     Ounce Labs, an IBM Company
By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
     CrowdStrike
By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
     Cisco
By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : hyperflex, systems, data platform, storage efficiency, business, cisco
     Cisco EMEA
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
An optimized hybrid IT infrastructure enables innovative business outcomes—but rapid IT transformation also creates new risks, threats and vulnerabilities. Coupled with increasingly sophisticated cyberattacks and complex regulatory pressures, managing risk in today’s digital environment becomes even more critical to the enterprise. Download now to learn more.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
     Cisco
By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
     Symantec
By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
     KPMG
By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
     Fortinet EMEA
By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : web analytics, frost & sullivan, bot management, botnet
     Akamai Technologies
By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : virtualization, security, consolidation, data, infrastructure, network, technology, networking, enterprise applications, business technology, data center
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : web security, mobile threats, security, cloud, application, technology, solution, networking, wireless, business technology, data center
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : security, data, users, infrastructure, bluecoat
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : web security, mobile, workforce, bluecoat, security
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : av defense, blue coat, web environment
     Blue Coat Systems
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
     MalwareBytes EMEA
By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
     Akamai
By: CA Technologies     Published Date: Nov 02, 2016
Today’s fast-moving markets present threats and opportunities at every turn. Whether you’re a large enterprise or a small startup, it’s no longer enough to simply practice agile development. To survive — and thrive — in this disruptive environment, you need agility throughout your organization.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
Today’s fast-moving markets present threats and opportunities at every turn. Whether you’re a large enterprise or a small startup, it’s no longer enough to simply practice agile development. To survive—and thrive—in this disruptive environment, you need agility throughout your organization.
Tags : 
     CA Technologies
By: IBM APAC     Published Date: Jun 24, 2019
Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. So why don’t companies feel more prepared to identify and respond to these threats? For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats – and nearly impossible to demonstrate ROI. IBM Security commissioned Forrester Consulting to evaluate the state of security complexity and the effect it is having on security efficiency and effectiveness. In the study, many respondents reported taking steps to simplify their security environments and the results are promising. Fill out this form to read more about it.
Tags : 
     IBM APAC
By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com