it threats

Results 201 - 225 of 1078Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
     MobileIron
By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : mimecast, data breach, personalized emails, network defenses, cyber threats, fraud protection, email security, security threats
     Mimecast
By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : email, security, trends, cyber attacks, threats, cyber threats, fraud protection, email security
     Mimecast
By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : mimecast, whaling, phishing, email attacks, email security, internet security, security, enterprise applications
     Mimecast
By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : healthcare, ransomware, ransomware attack, seg, secure email gateway
     Mimecast
By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
     Mimecast
By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
     Mimecast
By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
     Mimecast
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
     VMware AirWatch
By: Palo Alto Networks     Published Date: Feb 24, 2016
Attackers are more sophisticated than ever
Tags : palo alto, cyber security, data, security organization, security
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : security, endpoint, zero day exploit, forrester, phishing, ddos
     Palo Alto Networks
By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
     Akamai Technologies
By: illusive networks     Published Date: May 18, 2016
This case study serves as a summary of illusive networks’ Red Team exercise with a global tech leader. The fact that a system employing illusive networks' Deceptions Everywhere® technology can stand up to a highly-trained Red Team, with the odds stacked against it, demonstrates how you can protect your systems against sophisticated attackers. Learn why a threat deception approach to cybersecurity, focused on the humans behind the attacks, is the most effective way to combat modern cyber threats.
Tags : 
     illusive networks
By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
     CA Technologies
By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: Juniper Networks     Published Date: Jan 23, 2018
Bringing your vision to life is no small undertaking. So the last thing you need are network security threats looming over head. That’s why our security products and services build an unprecedented level of security into the DNA of your network. That way, you can focus on your dreams with absolute confidence.
Tags : 
     Juniper Networks
By: WorkBook from Deltek     Published Date: Jul 20, 2018
Competitive threats and mushrooming client demands erode the bottom line for many agencies. This eBook provides actionable steps to help you keep your best employees and deliver profit growth, by: • Ensuring you get paid enough for every engagement • Empowering your staff to reign in over-servicing • Making your strategic value clear to clients
Tags : 
     WorkBook from Deltek
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether it’s speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: CA Technologies     Published Date: Aug 22, 2017
The world of computing is changing before our eyes. Industries that had a consistent and predictable business model for generations are being turned upside down. In the digital economy, a seamless customer experience is critical. Whether a retailer is exploring new innovative online selling strategies or a bank is determining how to anticipate customer needs for new services – a high performing and scalable IT ecosystem is key to success. At the end of the day, as an IT leader, you need to help your business anticipate opportunities, drive growth and proactively prevent threats to your company’s revenue.
Tags : proactively manage, remediate faster, improve productivity, collaborate efficiently, application performance, ca technologies
     CA Technologies
By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability
     Schneider Electric
By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, “The Five Essential Capabilities of an Analytics-Driven SOC”, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunk’s, are needed to prevent, detect and respond to attacks in today’s security landscape
Tags : 
     Splunk
By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
     Splunk
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com