security as service

Results 276 - 300 of 300Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
    
VMware AirWatch
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
    
Akamai Technologies
Published By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
snapper, data, amazon, cwp, storage
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Intel® Xeon® Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Intel® Xeon® Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. New Possibilities Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
    
Spectrum Enterprise
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Intel® Xeon® Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell Server
Published By: Turbonomic     Published Date: Nov 12, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how t
Tags : 
    
Turbonomic
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. To find out more on how Cisco can help with these challenges download this white paper today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Zscaler     Published Date: Jun 19, 2019
Zscaler enables you to shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by delivering the entire gateway security stack as a service. Take the first step in your transformation journey with Zscaler.
Tags : 
    
Zscaler
Published By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
    
Rackspace
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search Resource Library