it threats

Results 1101 - 1112 of 1112Sort Results By: Published Date | Title | Company Name
By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates today’s advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : websense threat report, security, websense, sophisticated security, web security, phishing, it management, data management
     Websense
By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : security, appliance, detection, blocking, malware, threats, sandboxing, forensic reporting
     Websense
By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : miercom, security, effectiveness, report, protect, network, threats, solutions
     Websense
By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : detecting unknown threats, websense, next-generation firewall
     Websense
By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : apts, understanding apts, apt security strategy, stages of advanced threats
     Websense
By: Wellspring     Published Date: Mar 15, 2019
Making the Right Decisions for Your Company's Innovation Needs Technology and R&D leaders contend daily with the daunting pace of technological change in their core products and platforms. Recognizing both new tech opportunities and disruptive threats, many managers have responded with tech scouting and tech landscaping programs. Building on these efforts, in the past few years a new mainstream has begun to adopt tech scouting as a mission-critical competency. Download this paper to learn how we examine the pros and cons of both internal (build) and outsourced (buy) tech scouting approaches. Then we will discuss various hybrid options that combine the best of “build” and “buy,” depending on your company’s existing structure and level of innovation maturity.
Tags : 
     Wellspring
By: WorkBook from Deltek     Published Date: Jul 20, 2018
Competitive threats and mushrooming client demands erode the bottom line for many agencies. This eBook provides actionable steps to help you keep your best employees and deliver profit growth, by: • Ensuring you get paid enough for every engagement • Empowering your staff to reign in over-servicing • Making your strategic value clear to clients
Tags : 
     WorkBook from Deltek
By: Zerto     Published Date: Oct 08, 2018
"Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 eBook will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure. This 101 guide will educate you on topics like: How to evaluate replication technologies Measuring the cost of downtime How to test your Disaster Recovery plan Reasons why backup isn’t Disaster Recovery Tips for leveraging the cloud Mitigating IT threats like ransomware Get your business prepared for any interruption, download the Disaster Recovery 101 eBook now!"
Tags : disaster recovery, dr strategy, ransomware
     Zerto
By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
     ZScaler
By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Découvrez notre rapport semestriel Cloud Security Insights Threat Report 2019 - une étude des menaces basées sur les protocoles SSL/TLS, qui examine le trafic chiffré sur le cloud Zscaler™ entre juillet et décembre 2018. Le rapport, compilé par notre équipe de recherche du ThreatLabZ, se penche sur une variété d’attaques exécutées via SSL et bloquées par Zscaler, parmi lesquelles les attaques de phishing, les botnets, l’exploitation du navigateur et le contenu malveillant.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 
     Zscaler
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com