web security

Results 1 - 25 of 701Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
     Mimecast
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
     Cisco Umbrella EMEA
By: Forcepoint     Published Date: Jan 03, 2019
Forcepoint Stratgies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn more!
Tags : network security, distributed offices, web security, branch security, digital transformation, data security, cyber security
     Forcepoint
By: Forcepoint     Published Date: Jan 03, 2019
Forrester study demonstrates positive ROI with Forcepoint Web and Email Security Cloud solutions The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period!
Tags : web security, cloud security, email security, web security cloud, email security cloud, digital transformation, branch security
     Forcepoint
By: Forcepoint     Published Date: Jan 03, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. View the webinar today!
Tags : cloud connectivity, cloud security, distributed network, distributed offices, digital transformation, data security, cloud security, sd-wan, secure web gateway, firewall, branch security
     Forcepoint
By: Citrix Systems     Published Date: Feb 14, 2019
"Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: - Why a holistic security approach is crucial - What a new security approach looks like - How Citrix solutions provide security across your entire stack"
Tags : 
     Citrix Systems
By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
     Zebra Technologies
By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Improve website monitoring, performance, capacity and security.
Tags : online, capacity, security, website monitoring, performance
     HP AppPulse Mobile
By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
     Cisco EMEA
By: Cisco EMEA     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : cisco, webex, collaboration
     Cisco EMEA
By: Akamai Technologies     Published Date: May 08, 2017
The gaming industry continues to grow rapidly, and it is projected to grow another 30% in the next three years1 . Online gaming is driving this growth as the industry is making a seismic shift from disk to digital. This shift comes with an abundance of opportunities and challenges, as digital gaming makes it easier than ever to get games into the hands of more players, in more places, in less time. TechValidate Research surveyed 131 Akamai Technologies, Inc. customer accounts to find out more about how gaming companies are innovating the marketplace and the challenges they need to overcome in order to do so. The results show the importance of web security, that acquiring and retaining new users is the biggest business challenge companies are facing, and that mobile is taking over as the most popular gaming platform.
Tags : techvalidate, gaming industry, online gaming, akamai gaming, gaming growth
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : cyber security, security, web linking, performance
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : cloud security, data, akamai
     Akamai Technologies
By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
     Cisco
By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : owasp, web application safety, data breaches, firewalls
     F5 Networks Inc
By: Cisco Spark     Published Date: Jun 22, 2017
The most successful businesses are greater than the sum of their parts. When individuals work together well, they fill in each other's blind spots and build on each other's great ideas. These conversations ultimately help teams be more productive, reduce time-to-market and come up with more innovative ideas. But if your teams are spread across different offices, or working from home, can you create the same collaborative magic? Web-based collaboration tools claim to break down the collaboration barriers that distance can build. Everyone agrees they can reduce the time and cost of travel. And yes, these tools can stream your colleagues' voices, facial expressions, and slide decks into your meeting room, so you can get a clearer picture of verbal and behavioral signals. But if you're researching collaboration platforms, you'll hear skepticism, too. Naysayers declare that: People won’t participate because they’re afraid of digital change. You just can’t trust the security of collaborati
Tags : 
     Cisco Spark
By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
     Symantec
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
     Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
     Limelight Networks
By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com