defenses

Results 76 - 100 of 132Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
Organizations looking for more intelligence and automation within their security defenses should include endpoint detection and response solutions to thwart new threats and protect endpoint-accessible assets.
Tags : 
endpoint detection, intel security, threat defense, endpoint protection
    
McAfee
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security
    
Mimecast
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: Sunbelt Software     Published Date: Mar 27, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
Tags : 
messaging, security, web threats, email threats, email security, spam, trojan, sunbelt
    
Sunbelt Software
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection
    
Webroot Inc
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research
    
Intel Security
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
It is generally accepted that a hybrid approach to IT operations gives enterprises both financial and operational flexibility— allowing them to apply new technologies with little or no capital investment and tap expertise without hiring new personnel. But it is still an imperfect solution, and with sophisticated new attacks propagating at an accelerated rate, security has become a top concern. This is evidenced by the growing number of C-level security executives and by the intensive efforts of IT organizations to identify and address the gaps in their enterprise defenses and improve their ability to respond to those attacks. It is clear that security for hybrid IT environments is due for an advanced upgrade.
Tags : 
information technology, optimization, it security, data protection
    
IBM
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
F5 Networks Inc
Published By: Cisco     Published Date: Nov 17, 2014
This document will identify the key questions you should ask your advanced malware protection vendor, and show you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
sourcefire, antimalware protection, network protection, evolving threats, antimalware vendors, malware, cisco, collective intelligence
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : 
sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
The report is divided into two main areas: Threat Intelligence, which gives an overview of the latest threat research from Cisco. And, Analysis and Observations, where security industry consolidation and the emerging concept of integrated threat defense is discussed.
Tags : 
cisco, security report, cisco security report 2015, threat intelligence, network defenses
    
Cisco
Published By: McAfee     Published Date: Jul 10, 2013
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
mcafee, blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
    
McAfee
Published By: Cisco     Published Date: Aug 24, 2015
The Cisco 2015 Midyear Security Report examines these intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.
Tags : 
malware, network defenses, detection, security gaps, threat defenses, trends
    
Cisco
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to learn why traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
traditional security, detection, blocking, protection, security model, threat landscape, cybercrime
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Start   Previous    1 2 3 4 5 6    Next    End
Search Resource Library