intel security

Results 226 - 250 of 448Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: Oct 21, 2015
This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Management of Native Encryption for Apple FileVault and Microsoft BitLocker
Tags : 
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : mcafee, intel, encryption, apple, filevault, microsoft, bitlocker, security
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : mcafee, intel, data, security, protection, networking
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration.
Tags : mcafee, intel, security, data, exfiltration, enterprise applications, data management
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
In this 30 page report they have compiled valuable tips, tricks, and techniques for streamlined and effective DLP deployments into straightforward processes to ease most common pain points.
Tags : mcafee, intel, security, dlp, securosis, networking, software development
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : mcafee, intel, security, content, protection, data center
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This guide will examine seven common misconceptions and distinguish between myth and reality.
Tags : mcafee, intel, security, malware, cyber, threat, networking, data management
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
In this brief, we’ll take a look at common use cases that show how integration between McAfee Advanced Threat Defense and other security controls from McAfee, a part of Intel Security, create a multipronged strategy designed to make enterprise defenses both more effective in detecting previously unknown malware and globally responsive when a new attack occurs.
Tags : mcafee, intel, security, threat, strategy, enterprise applications
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Get free access ($195 value) to this Gartner research that identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users. CISOs should avoid these practices, and they can do so without sacrificing security posture or breaking the bank.
Tags : mcafee, intel, security, gartner, report, network, networking
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : mcafee, intel, security, cyber, criminal, networking, data management
     Intel Security
By: Cyveillance     Published Date: Oct 20, 2015
In this white paper, we examine what we consider to be three necessary steps when making a business case for threat intelligence for your organization. Companies must define what they need and why they need it, align security needs and business objectives, and finally, develop an effective plan. We then offer two example scenarios of how businesses can put these steps together and created a solid justification for threat intelligence.
Tags : cyveillance, threat intelligence, security, security professionals, it management, it security
     Cyveillance
By: Intel Security     Published Date: Oct 20, 2015
Explore and Understand the Seven Common Misconceptions Regarding Advanced Malware
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Think Like a Thief
Tags : network security, attack, methods
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
"If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation."
Tags : 
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrant for Mobile Data Protection
Tags : 
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : aberddeen, data center, datacenter, cloud, server security, networking, data management
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : server security, virtual server security, cloud server security, data center server security, security, data management
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : management of native encryption, mne, data protection, filevault, bitlocker, pat correia
     Intel Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com