Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

prevention

Results 351 - 375 of 476Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Oct 10, 2013
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, network performance, network security, firewalls, internet security
    
McAfee
Published By: McAfee     Published Date: Nov 11, 2013
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, firewalls, hacker detection, intrusion detection, intrusion prevention, data protection
    
McAfee
Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention, malware, cyberattack, network security, storage virtualization, anti virus, email security, intrusion detection, best practices, data protection
    
Kaspersky
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : 
data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk, security, data management
    
HP Enterprise Services
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention, application security, hacker detection, intrusion detection, intrusion prevention, security management
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security, data loss prevention
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
fraud prevention, malware detection, threat intelligence, cybercrime, technology, internet security, intrusion detection, intrusion prevention, security management
    
IBM
Published By: IBM     Published Date: Nov 06, 2014
In this webcast, you’ll learn how IBM® SmartCloud® Analytics—Predictive Insights helps you prevent application degradation and service outages.
Tags : 
operations analytics, it analytics, service outage prevention, monitoring management solutions, it management, knowledge management, enterprise applications
    
IBM
Published By: Business.com     Published Date: Oct 09, 2012
Is your home secure? The word "secure" is rather vague in context, so perhaps a more important question to ask perspective security system purchasers is, do you feel like your home is secure?
Tags : 
home security systems, security, prevention, detection, electronics
    
Business.com
Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention, network security, anti spam, application security, intrusion detection, phishing, data protection
    
Rapid7
Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management, best practices, prediction practices, security, monitoring, business activity monitoring, information management
    
SAS
Published By: SAS     Published Date: Jun 10, 2016
Understanding security analytics can be a daunting job. It is more than just analyzing log files but it is less than a full-blown information security platform. In fact, according to Anton Chuvakin, research vice president for security and risk management at Gartner, it is not yet even a “market,” but rather still just a ”concept” that has yet to define best practices.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, analytics, prevention, network management, business activity monitoring, business analytics, business management
    
SAS
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control, identity management, internet security, intrusion detection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Published By: Quest Software     Published Date: Apr 19, 2012
Avoid Active Directory Disasters
Tags : 
active directory, quest, solutions, avoid, solutions, prevention, scriptlogic, security
    
Quest Software
Published By: Damballa     Published Date: Apr 14, 2014
Learn about the new ways to detect advanced threats and see how you can integrate big data intelligence to enable breach prevention.
Tags : 
malware, threats, security, network based intelligence, detection, big data, breach prevention, malware analysis
    
Damballa
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security, it management, data management, data center
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report, data management, data center
    
Arbor Networks
Published By: Evergage, Inc.     Published Date: Nov 13, 2014
Start Turning More Visitors into Customers There’s no way around it – the future of Digital Marketing is Personalization. By presenting your online audiences with relevant, personalized content in real time, you can create engaging experiences that increase conversion rates by as much as 300%. This FREE eBook can help you turn visitors into customers with inspirational examples and ideas for: • Bounce Prevention • Relationship Building • Visitor Conversion • Creating Advocates
Tags : 
website personalization, customer-website interaction, real-time
    
Evergage, Inc.
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to discover, monitor and protect your sensitive information to maximize the efficiency of your data management and see how you can greatly improve your data loss prevention.
Tags : 
security, data loss prevention, data management, monitor and protect, data efficiency
    
Symantec
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search