intel security

Results 76 - 100 of 437Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We liked that Umbrella’s intelligent proxy would give us granular protection without the performance impact of a traditional web proxy.” - Torben Olsen, Corporate Information Security Manager, Lundbeck
Tags : 
     Cisco Umbrella EMEA
By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
     IBM APAC
By: Amazon Web Services     Published Date: Oct 09, 2017
As easy as it is to get swept up by the hype surrounding big data, its just as easy for organisations to become discouraged by the challenges they encounter while implementing a big data initiative. Concerns regarding big data skill sets (and the lack thereof), security, the unpredictability of data, unsustainable costs, and the need to make a business case can bring a big data initiative to a screeching halt. However, given big data's power to transform business, it's critical that organisations overcome these challenges and realise the value of big data. The cloud can help organisations to do so. Drawing from IDG's 2015 Big Data and Analytics Survey, this white paper analyses the top five challenges companies face when undergoing a big data initiative and explains how they can effectively overcome them.
Tags : amazon, web services, intel, migration, data warehousing, organization optimization, security, software
     Amazon Web Services
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
     Symantec
By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: EMC Corporation     Published Date: May 27, 2014
RSA Paper: In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain. This RSA Security Brief looks at the areas for improvement where investment will typically generate the greatest security benefit.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: EMC Corporation     Published Date: May 27, 2014
RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
     Forrester
By: RSA Security     Published Date: Oct 24, 2013
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : rsa, emc, security, operations center, threat, threat detection, intelligence-driven
     RSA Security
By: Intel Security     Published Date: Oct 20, 2015
Think Like a Thief
Tags : network security, attack, methods
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrants offer visual snapshots, in-depth analyses and actionable advice that provide insight into a market's direction, maturity and participants.
Tags : data protection, mobile, security
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Most effective DLP solutions are implemented as a business process, rather than a “set and forget” technology. Get complimentary access to this Gartner report ($195 value.) In this report, Gartner dentifies some key challenges CISOs face and provides guidance on a business process approach to a successful DLP implementation.
Tags : intel, gartner, data loss, dlp, ciso, networking, data management
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : mcafee, intel, security, virtual, cloud, data center
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : mcafee, intel, security, windows, server, support, networking, data center
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : mcafee, intel, security, data, center, networking, data center
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : mcafee, intel, security, data, cloud, data center
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking, security, data management
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : mcafee, intel, encryption, apple, filevault, microsoft, bitlocker, security, enterprise applications
     Intel Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com