security as service

Results 226 - 250 of 254Sort Results By: Published Date | Title | Company Name
By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
     Tenable
By: TIBCO Software APAC     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
     TIBCO Software APAC
By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure™ and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen™, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isn’t effective against a given threat, another will step in to eliminate the threat.
Tags : 
     Trend Micro
By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Mar 17, 2009
West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, sophos, symantec, west coast, interscan, distributed denial of service, ddos, filtering
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service, spam filter for exchange, hosted antispam, managed antispam, enterprise anti-spam, mcafee, ironport, fortinet, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Tripwire     Published Date: Jan 30, 2008
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Tags : cmdb, change management, configuration management, risk management, compliance, idg, tripwire, lifecycle management
     Tripwire
By: Turbonomic     Published Date: Jul 05, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to iden
Tags : 
     Turbonomic
By: Turbonomic     Published Date: Nov 12, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how t
Tags : 
     Turbonomic
By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : tyco, security, commercial, loss prevention
     Tyco Integrated Security
By: Unitek Education     Published Date: Jan 08, 2009
Unitek's CCNA boot camp is taught by a certified industry expert, who is adept at not just CCNA curriculum, but also teaches CCNP and CSP1 (Cisco high-end security track) tracks. The instructor is also a Unitek consultant, and spends a significant portion of his time providing high-end network infrastructure consulting services. A true industry expert!!
Tags : unitek, ccna, ccna boot camp, ccna curriculum, cisco high-end security track, network infrastructure, cisco ccna, it career advancement
     Unitek Education
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications, business technology
     Veracode
By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca), server gated cryptography, sgc, certificate management, certificate-revocation list, crl
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
     VeriSign Incorp.
By: VMware     Published Date: Nov 04, 2016
The digital economy is changing expectations for IT organizations, driving the need to rapidly provide resources to development, QA, and line-of-business teams to develop and roll out applications. While business wants IT to be more responsive, IT must address the need for speed with policy-driven governance, compliance, security, and performance. In our eBook, “Top 3 Reasons Why You Need Cloud Management,” we define the need for cloud management platforms, expand on the requirements and take a closer look at how other organizations are deploying cloud management platforms to improve management of the entire IT services delivery lifecycle.
Tags : 
     VMware
By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
     VMware
By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
     VMware AirWatch
By: Wasabi     Published Date: Nov 13, 2018
As state and local governments join the digital revolution, it’s increasingly important that they find safe, effective and efficient ways to store the data they’re creating. In this case study you’ll see how an integrated solution from Wasabi Hot Cloud Storage and Commvault Complete Backup gave one municipality the security they needed while increasing performance and cutting costs. This city had been using Amazon Glacier but was frustrated with the speed and unpredictable fees associated with retrieving their data. In turning to Wasabi they were able reduce costs by 80% and increase speed over 6x. Plus since Wasabi offers just one tier of service with one price and no fees to retrieve your data they were able to simplify both the process and budgeting. Between Wasabi and Commvault their skyrocketing data needs now scalable solution that gives them the security and performance they need for significantly less than they were paying before. To learn more please download the case study.
Tags : 
     Wasabi
By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
     Webroot
By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security, business technology
     Webroot
By: Windstream     Published Date: Apr 03, 2014
Choosing the right type of cloud depends on the needs of your organization. Learn how security, control, customization, elasticity and cost determine what kind of cloud best fits your business as well as what to look for in a service provider.
Tags : windstream, convergence, mobility, unified communications, mobile enterprise, private clouds, hybrid cloud
     Windstream
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com