threat management

Results 76 - 100 of 241Sort Results By: Published Date | Title | Company Name
By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
     KPMG
By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management
     Fortinet, Inc.
By: Fortinet, Inc.     Published Date: Jul 27, 2011
Tighter security requirements and ever-faster networks are placing extraordinary demands on UTM platforms. In order to accelerate network traffic while blocking new threats, enterprises must deploy specialized hardware/software security devices.
Tags : fortinet, utm platform, unified threat management, network security, ssl vpn, ipv6, network performance management, security content, threat protection, traffic inspection, traffic monitoring
     Fortinet, Inc.
By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway, web gateway, mobile security, ssl protection, web 2.0, bandwidth management, ips, mobile devices, saml
     ZScaler
By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : rsa, emc, secuirty, warning, threat, analytics, security
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Tags : rsa, emc, security, analytics, architecture, data
     RSA Security
By: Oracle     Published Date: Feb 22, 2019
Successful digital business depends on fast, reliable,and secure applications. Threats of service disruptions from performance slow downs, availability outages, or security incidents are driving IT organizations and service providers to double down on comprehensive system management solutions across infrastructure, applications, and end-user devices.
Tags : 
     Oracle
By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : corporate governance, capital requirements, information security, erm program, enterprise risk management
     Fiserv
By: IBM     Published Date: May 30, 2018
This book is designed to help you get the upper hand on managing your enterprise security through an integrated threat management strategy.
Tags : 
     IBM
By: Domino Data Lab     Published Date: May 23, 2019
This paper introduces the practice of Model Management, an organizational capability to develop and deliver models that create a competitive advantage. Today, the best-run companies run their business on models, and those that don’t face existential threat. The paper explains why companies that fail to run on models are falling for the Model Myth—the assumption that models can be managed like software or data. Models are different and need a new organizational capability: Model Management. What’s inside: Defining a model Why models matter for businesses Why companies fall for the Model Myth A framework for Model Management Practical steps to get started The paper is intended for anyone in a data science organization, or anyone who hopes to use data science as a key source of competitive advantage for their business.
Tags : 
     Domino Data Lab
By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : data security, security, cyber attacks, threat and vulnerability management
     Centrify
By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security, business technology
     Splunk
By: WatchGuard     Published Date: Oct 16, 2012
Network security may be old-school, but it is not passé; the right perimeter protection means more threats stay outside & more data stays inside. Learn more about capabilities that are available in a modern network perimeter UTM solution.
Tags : utm, watchguard, unified threat management, market research, report, security, infrastructure, data management, business technology
     WatchGuard
By: WatchGuard     Published Date: Oct 17, 2012
The Cisco ASAs and point solutions were not cutting it. The 3-person IT team needed a solid multi-layered solution that was easy to manage and could consolidate many processes within one device. Learn how WatchGuard provided an easy to manage answer.
Tags : watchguard, it solution, administrator, it infrastructure, it security, data management, utm, unified threat management, security, business technology
     WatchGuard
By: WatchGuard     Published Date: Oct 17, 2012
Learn how STF Consulting used Watchguard to help them develop an easy to implement solution and helped them create multilayered network protection.
Tags : watchguard, utm, unified threat management, it infrastructure, it security, data management, security, business technology
     WatchGuard
By: NetIQ     Published Date: Nov 05, 2012
The broad adoption of SIEM technology is driven by security and compliance needs. Targeted attack discovery requires effective user activity, data access and application activity monitoring. Vendors are testing demand for broader-scope solutions.
Tags : siem technology, threat management, security management, enterprise security, compliance, security, business technology, research
     NetIQ
By: Verizon     Published Date: Nov 14, 2013
Learn 7 advanced cyber-security threat management solutions in order to prevent data breaches and strengthen your organization’s ability to detect and respond to these threats in days instead of months.
Tags : verizon, cyber-security, threat management solutions, external reconnaissance, data exfiltration, it management
     Verizon
By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : cybersecurity, industrial networks, security capabilities, indegy
     Indegy
By: KPMG     Published Date: Jul 31, 2019
Banks need to be agile to respond to threats and embrace new approaches and technologies to predict and prevent fraud. Read our global perspective of how banks are tackling internal and external fraud threats. Read this report to discover: • how banks are deploying resources to optimise their fraud risk management efforts • trends in fraud typologies from investigations and group security professionals • challenges banks are facing in mitigating internal and external threats
Tags : 
     KPMG
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Threat Manager – with Advanced Log Management, a security logging and event correlation monitoring solution for any size organization.
Tags : threat manager, at&t, advanced log management, security logging, event correlation monitoring, hackers, cybersecurity
     AT&T
By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
     Tenable
By: Veeam Software     Published Date: Nov 10, 2016
In this book, I explain in clear, concise language how virtualization changes an organization’s backup needs, and how traditional backup solutions will — or won’t — work with that technology. Then I tell you about a set of innovative solutions from Quantum that solve many of the problems inherent in virtual data protection.
Tags : virtualisation, vm data protection, threat and vulnerability management, data protection
     Veeam Software
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com