bi environments

Results 1 - 25 of 308Sort Results By: Published Date | Title | Company Name
By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
     Gigaom
By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Software development has evolved from rigid waterfall methodologies to more streamlined approaches, like Agile and more recently DevOps. This evolution has taken place in large part to shorten development life cycles and meet increased business demands. Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes, which break down silos between development and operations, allowing organizations to create better software faster. As organizations implement DevOps on Amazon Web Services (AWS), they need to understand the security implications. The AWS Shared Responsibility Model makes clear that AWS secures what’s “on the cloud,” while the customer is responsible for securing their assets “in the cloud.” When AWS customers go about securing their DevOps environments, they need to do so in a way that provides robust protection without limiting developer agility.
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
     AWS
By: Ricoh     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
     Ricoh
By: Ricoh US     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
     Ricoh US
By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
     Forcepoint
By: AWS     Published Date: Oct 02, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
     AWS
By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
     Pure Storage
By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
     Pure Storage
By: Darktrace     Published Date: Sep 04, 2019
Michael Sherwood, CIO of City of Las Vegas, explains how implementing Darktrace’s Enterprise Immune System with its autonomous defense capability fundamentally transformed his team’s cyber security posture. Whether upstream, midstream, or downstream, Darktrace can be deployed to protect oil and gas production and transportation. Remote deployments on rigs can include local modeling and analysis, as well as central correlation for security monitoring of all assets. Darktrace appliances can support low-bandwidth and inhospitable environments through the use of ruggedized industrial probes. With Darktrace’s Industrial Immune System, the entire infrastructure is visualized and protected, including Industrial IoT and ICS.
Tags : 
     Darktrace
By: Gigamon     Published Date: Sep 03, 2019
Banking institutions worldwide are expanding their digital capabilities to meet evolving customer expectations and keep pace with new digital banking trends. As financial services firms increasingly embrace a multicloud strategy to achieve greater agility and cost savings, pervasive visibility across data centres and cloud environments is paramount to meet evolving security and compliance requirements.
Tags : 
     Gigamon
By: TIBCO Software     Published Date: Aug 20, 2019
The oil field is being dynamically transformed through the connective power of the Internet, the advancements in remote connected sensors, and the possibilities of machine learning and artificial intelligence (AI). As the quest for hydrocarbons and alternative energy sources extends into deeper and harsher environments, operators, service companies, and asset owners are leveraging technology advancements to ensure their employees are safer, their fields are more productive, and their capital assets are operating at peak efficiency.
Tags : machine learning, predictive analytics, hydrocarbons, oil&gas, cybersecurity, asset efficiency, safety
     TIBCO Software
By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
Welcome to Secure Hybrid Cloud For Dummies, IBM Limited Edition. The hybrid cloud is becoming the way enterprises are transforming their organizations to meet changing customer requirements. Businesses are discovering that in order to support the needs of customers, there is an imperative to leverage the highly secure IBM Z platform to support missioncritical workloads, such as transaction management applications. The Z platform has been transformed over the years. The combination of z/OS, LinuxONE, open APIs, and the inclusion of Kubernetes has made IBM Z a critical partner in the hybrid cloud world. Businesses can transform their IBM Z environments into a secure, private cloud. In addition, through IBM’s public cloud, businesses may take advantage of IBM Z’s security services to protect their data and applications.
Tags : 
     Group M_IBM Q3'19
By: Cohesity     Published Date: Aug 09, 2019
As organizations continue to look for ways to increase business agility, a need for a modern database architecture that can rapidly respond to the needs of business is more apparent than ever. While an RDBMS still serves as a lifeline for many organizations, the adoption of technologies such as NoSQL and Hadoop are enabling organizations to best address database performance and scalability requirements while also satisfying the goals of embracing hybrid cloud and becoming more data-driven. And with organizations relying so heavily on these new technologies to yield rapid insights that positively impact the business, the need to evaluate how those new technologies are managed and protected is essential. Hadoop and NoSQL workloads are now pervasive in production environments and require “production-class” data protection, yet few data protection solutions offer such capabilities today.
Tags : 
     Cohesity
By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
     Forcepoint
By: Citrix ShareFile     Published Date: Jul 02, 2019
In this January 2019 report from Forrester, you’ll learn how leading technology companies must engage their customers consistently while learning from their changing needs. To make this happen, IT leaders must offer technical platforms that enable agility and end-to-end integration. This report will show you: • Why tech leaders must embrace technology that engages and adapts with customers • The importance of building tech platforms that deliver speed and flexibility • How to automate and scale Zero Trust security throughout your environments
Tags : 
     Citrix ShareFile
By: Workplace by Facebook     Published Date: Jun 24, 2019
As the generation that pioneered the social media persona, Gen Y aren’t known for fading into the background – the average Gen Yer juggles four different social media accounts, crafting individual personalities on each. But despite their desire to stand out, today’s young people are especially keen to work together; so much so that 40% would even pay out of their own pocket for social collaboration tools at work Despite this, workplaces aren’t always giving them the tools they need to work effectively with one another. While 38% of Gen Y feel that outdated modes of collaboration obstruct a company’s ability to innovate, 71% say they face challenges using their company’s collaboration tools. As a result, they’re taking it upon themselves to create collaborative working environments, share innovative ideas and embrace the diversity of thought that comes along with it. Download this report to find out what Gen Yers expect from their workplaces today.
Tags : 
     Workplace by Facebook
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com