security as service

Results 76 - 100 of 299Sort Results By: Published Date | Title | Company Name
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks Incident Management and Response team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents. This paper is designed to help you ask tough, dir ect questions of any incident response services provider to help you determine the vendor’s capabilities, and if that vendor represents the best fit based on your organization’s particular needs. We highly recommend using the following questions when evaluating any outside assistance with your incident response function.
Tags : 
    
Secureworks
Published By: Wasabi     Published Date: Nov 13, 2018
As state and local governments join the digital revolution, it’s increasingly important that they find safe, effective and efficient ways to store the data they’re creating. In this case study you’ll see how an integrated solution from Wasabi Hot Cloud Storage and Commvault Complete Backup gave one municipality the security they needed while increasing performance and cutting costs. This city had been using Amazon Glacier but was frustrated with the speed and unpredictable fees associated with retrieving their data. In turning to Wasabi they were able reduce costs by 80% and increase speed over 6x. Plus since Wasabi offers just one tier of service with one price and no fees to retrieve your data they were able to simplify both the process and budgeting. Between Wasabi and Commvault their skyrocketing data needs now scalable solution that gives them the security and performance they need for significantly less than they were paying before. To learn more please download the case study.
Tags : 
    
Wasabi
Published By: Zingbox     Published Date: Nov 08, 2017
The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe. Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one. This report describes the challenges inherent in securing the IoT. And explains how IoT security differs from conventional IT security.
Tags : 
    
Zingbox
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
    
Cisco Umbrella EMEA
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
The end of support date for Windows XP–April 8, 2014 is rapidly approaching, after which the potential for security vulnerabilities will dramatically increase. Companies with lots of Windows XP machines still in use need help upgrading in this compressed timeframe. Lenovo has an answer, as its Image Technology Center (ITC) services along with the Lenovo In-Place Migration (IPM) product can help internal IT staff quickly and successfully migrate from Windows XP to Windows 7 or Windows 8 with a minimum of disruption to users and the organization.
Tags : 
security, windows 8, windows xp, secure platform, enterprise computing, mdm, client virtualization software
    
Lenovo and Microsoft
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
Integrated on-premises solutions offer tight control and flexibility, but can be quickly overwhelmed by a large volumetric attack. Managed cloudbased services deliver protection from those largeattacks, but can be expensive if used for all traffic, all the time. By using a combination of on-premises security devices and a cloud-based scrubbing service to handle volumetric attacks, organizations maintain control, while spinning up cloud-protection services as needed to handle the largest volumetric floods.
Tags : 
model, ddos, protection, solutions
    
F5 Networks Inc
Published By: Microsoft     Published Date: Oct 24, 2016
This Technology Spotlight examines the important role played by enterprise mobility management (EMM) technology in managing the security challenge posed by the combination of mobile devices and cloud-based software-as-a-service (SaaS) apps. It also explores the role of Microsoft's Enterprise Mobility Suite (EMS) in the strategically important EMM market.
Tags : 
mobility, enterprise mobility management, software as a service, cloud, mobile security
    
Microsoft
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You keep close control of the security you need to manage. You can stop being concerned about the security of the foundational services your IT infrastructure is built on. You get the benefits of a robust cloud infrastructure with a reliably secure service that’s scalable, responsive, and efficient. More control, more compliance, less time, less effort.
Tags : 
security, cost, compliance, disruption, mitigation, management, maintenance
    
Amazon Web Services
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
In the face of all the challenges presented by the accelerating pace of application development and everexpanding options for deployment, IT organizations are changing how they deliver services. Traditional manual approaches are simply too slow to keep up. Yet, when application teams attempt to circumvent IT in order to speed up deployment, security, performance, and longterm manageability suffer. To get the most out of your multi-cloud deployments, you need to fundamentally rethink how you deliver the right application services that meet current and future needs, consistently across every cloud. Standardization is key. If too much is changing too quickly, start with standardization. As your organization evolves, you will be better positioned to take the next step in making those standardized services accessible to developers through the automation toolchains they rely on.
Tags : 
multi cloud, organizations, application, security, deployment, performance
    
F5 Networks Inc
Published By: EMC Corporation     Published Date: May 27, 2014
RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : 
cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway, web gateway, mobile security, ssl protection, web 2.0, bandwidth management, ips, mobile devices, saml
    
ZScaler
Published By: Delphix     Published Date: May 28, 2015
"Security-conscious organizations face a gap between current requirements and capabilities as they relate to data masking. Data volumes are growing exponentially and the risk of data leaks continues to make news, yet many organizations rely on inefficient, legacy approaches to protecting sensitive data. In contrast, top performing companies are turning to virtual databases and service-based masking solutions to ensure that data management functions can keep up with software development.
Tags : 
    
Delphix
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations The best use cases for implementing a supplemental or secondary DNS service
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: The critical role DNS plays in the user experience The failure and outage risks of relying on a single DNS solution The major resiliency and performance differences between unicast vs anycast addressing Criteria for evaluating a managed DNS service provider Download Now!
Tags : 
    
Oracle + Dyn
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library