ex filtration

Results 26 - 33 of 33Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : 
damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
Damballa
Published By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : 
arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud
    
Arbor
Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established
    
FireEye
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing
    
Symantec Corporation
Published By: Verizon     Published Date: Nov 14, 2013
Learn 7 advanced cyber-security threat management solutions in order to prevent data breaches and strengthen your organization’s ability to detect and respond to these threats in days instead of months.
Tags : 
verizon, cyber-security, threat management solutions, external reconnaissance, data exfiltration
    
Verizon
Published By: Genesys     Published Date: Mar 01, 2008
Filtration experts have discussed filter presses and their perceived shortcomings. This article discusses filter presses as well as the batch or continuous filtration alternatives to replace them.
Tags : 
    
Genesys
Previous    1 2     Next   
Search Resource Library