intel security

Results 276 - 300 of 437Sort Results By: Published Date | Title | Company Name
By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection, spam
     McAfee Inc
By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
     McAfee Inc
By: SAS     Published Date: Apr 13, 2011
BI usage among organizations with mobile BI has doubled compared to those companies that have not mobilized their BI. Learn about these results, the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : mobile bi, business intelligence, andrew borg, david white, aberdeen, performance management, data management, knowledge management
     SAS
By: Intel Corp.     Published Date: Apr 25, 2012
Security technologies built into Intel® Xeon® processor-based servers give cloud solution providers tools for security challenges.
Tags : cloud, cloud computing, myths, infrastructure, services, it executives, data, intel
     Intel Corp.
By: Intel Corp.     Published Date: Apr 26, 2012
Dealing with compliance, privacy, data and application security in the cloud
Tags : virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
     Intel Corp.
By: IBM     Published Date: Jul 12, 2012
Today's technology landscape is transforming the concepts of business IT prevalent only just a few short years ago. With this transformation, however, has also come an equivalent transformation of risks.
Tags : enterprise security, ema, ibm, security, intelligence, enterprise applications
     IBM
By: IBM     Published Date: Jul 12, 2012
Join EMA Managing Research Director Scott Crawford and IBM Director of Identity & Access Management Ravi Srinivasan for a discussion of the ways that a more expansive concept of identity intelligence is transforming the nature of information security
Tags : information security, ema, ibm
     IBM
By: IBM     Published Date: Sep 09, 2013
Learn about IBM's worldwide security operations and receive their free analysis of cyber security attacks and incident data
Tags : ibm security services, ibm, security services, cyber security intelligence, cyber security, index, cyber security intelligence index
     IBM
By: Neustar Inc.     Published Date: Oct 14, 2013
As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.
Tags : digital rights management, ip intelligence, best practices, neutar, security, wireless security, online content, rights
     Neustar Inc.
By: Cyveillance     Published Date: Oct 20, 2015
In this white paper, we examine what we consider to be three necessary steps when making a business case for threat intelligence for your organization. Companies must define what they need and why they need it, align security needs and business objectives, and finally, develop an effective plan. We then offer two example scenarios of how businesses can put these steps together and created a solid justification for threat intelligence.
Tags : cyveillance, threat intelligence, security, security professionals, it management, it security
     Cyveillance
By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : lab, reports, improvement, storage, data, technologies, purchasing, valuable
     Intel Corporation
By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : advanced threat defense, endpoint security, tech target research, security, it management
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : gartner, buyers guide, endpoint security, security, it management
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : aberdeen, free av, endpoint security, security, it management
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
As organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Tags : endpoint, security, vendor, iot, it management
     Intel Security
By: Intel Security     Published Date: Feb 16, 2016
Download a free copy ($1,995 value) of Gartner's 2016 Magic Quadrant for Endpoint Protection Platforms compliments of Intel Security. Gartner Magic Quadrants are based on rigorous, fact-based analysis backed up by a highly structured methodology. Read this report and find out why for the 13th consecutive year Gartner has positioned Intel Security as a leader in the Gartner Magic Quadrant for the Endpoint Protection Platforms (EPP) market report.
Tags : 
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Spend less on prevention; invest in detection, response and predictive capabilities.
Tags : security architect, information, continuous response, incident, monitoring, remediation, adaptive architecture, protection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : risk, threat, attack vector, security strategy, security architect, information, continuous response, incident
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This report examines organizations’ security strategies, cyber-attack environments, IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills and poor security analytics capabilities.
Tags : siem, esg, jon oltsik, golden hour, attack detection and incident response
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
The SANS 2015 Incident Response survey results reveal an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Tags : siem, incident response, sans, continuous monitoring
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com