protocol

Results 1 - 25 of 248Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
     Cisco Umbrella EMEA
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
     VMware SD-WAN by VeloCloud
By: Intel     Published Date: Apr 09, 2019
Get a glimpse into the workshop hosted in Milan, Italy, where participants learn about industrial protocols and sensors, computer vision, time-sensitive networks, and more.
Tags : 
     Intel
By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q119     Published Date: Mar 05, 2019
The Aspera FASP high speed transport platform is enabled to provide high-performance secure WAN transport of files, directories, and other large data sets to, from and between a number of leading third-party cloud storage platforms. The implementation is an enhanced transport stack and virtual file system layer in the Aspera server software that allows for direct-to-object-storage transfer over the WAN using the FASP protocol and the native I/O capabilities of the particular third-party file system. The stack is available in all generally available Aspera server software products and supports interoperable transfer with all generally available Aspera client software
Tags : 
     Group M_IBM Q119
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
Tags : tls 1.3
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
Tags : tls 1.3
     F5 Networks Singapore Pte Ltd
By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
     Fujitsu America, Inc.
By: HotSchedules     Published Date: Jan 17, 2019
Food safety should always be top-of-mind. Even one foodborne illness could put your restaurant out of business. The safety and well-being of your customers are at stake when your team isn’t following proper food safety protocol. This is where employee training becomes essential: your business needs a culture that values food safety. Typically though, food safety training hardly comes off as an exciting topic. But with today’s technology training can be engaging, entertaining, and memorable. This ebook will show you how to breathe new life into your food safety training with four lessons on making training more impactful.
Tags : 
     HotSchedules
By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
     Akamai Technologies
By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
     AuditBoard
By: Salesforce     Published Date: Nov 09, 2018
For the second annual “State of Service” report, Salesforce Research surveyed more than 2,600 customer service professionals worldwide to discover: • How service leaders are responding to heightened customer demands • Which habits are hallmarks of top service teams • How smart tech is impacting service protocols In this report, high-performing service teams are the top 14% who rate both their service performance and performance versus competitors as excellent. See page 3 for further information on performance.
Tags : 
     Salesforce
By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
     Preempt
By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
     Cisco Umbrella EMEA
By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : smart mobility, technology solutions, integrated management
     Fujitsu America, Inc.
By: Group M_IBM Q418     Published Date: Oct 16, 2018
Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
Tags : 
     Group M_IBM Q418
By: Thomson Reuters     Published Date: Aug 10, 2018
Documents reviewed for production are the facts that underlay all claims and defenses – and they matter. But with volumes and costs exploding, it’s harder than ever to find the needle in the haystack. Join litigation experts from Thomson Reuters as they show you how to design a document review with an eye toward fact-finding, case analysis, and litigation strategy. Attendees should have a basic understanding of document review and production practices and terminology. In this complimentary webinar, you will learn more about: How to design a strategic review protocol Optimizing process to increase communication Knowledge sharing between the review and the law firm teams Next steps once production is complete This is Part I of a multi-part webinar series on leveraging document review to maximize litigation strateg
Tags : leveraging, document, review, maximize, litigation, strategy
     Thomson Reuters
By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
     DigiCert
By: Infosys     Published Date: May 21, 2018
As with many large, established banks, our client's infrastructure was centered on a core banking system that was dependent on packaged systems and highly complex backends. Each time a new product was launched or changed, the back-end had to be reintegrated with the customer-facing channel. This was time-consuming and the bank wanted to speed up their time to market, in order to respond to the customer demand for product innovation. They therefore, needed to move from a predominately peer-to-peer (P2P) oriented multi protocol architecture to an API-Based integration platform, and set out to find a partner by issuing a request for proposal (RFP). We were keen to respond, but wanted to present a proposal with a difference.
Tags : api, infrastructure, banking, system, rfp, proposal
     Infosys
By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
     Tripp Lite
By: HotSchedules     Published Date: Apr 25, 2018
Food safety should always be top-of-mind. Even one foodborne illness could put your restaurant out of business. The safety and well-being of your customers are at stake when your team isn’t following proper food safety protocol. This is where employee training becomes essential: your business needs a culture that values food safety. Typically though, food safety training hardly comes off as an exciting topic. But with today’s technology training can be engaging, entertaining, and memorable. This ebook will show you how to breathe new life into your food safety training with seven lessons on making training more impactful.
Tags : 
     HotSchedules
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously. They also need to co-locate multiple systems while sharing power and energy. This is true for large as well as small environments. The trend in modern IT is to consolidate as much as possible to minimize cost and maximize efficiency of data centers and branch offices. HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently. HPE 3PAR OS and converged controllers incorporate multiprotocol support into the heart of the system architecture
Tags : 
     Hewlett Packard Enterprise
By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : iot, iot security, iot endpoint security
     Great Bay Software
By: Oracle Dyn     Published Date: Dec 06, 2017
DNS speed and reliability are fundamental to the performance of your website and essential to your business. Contact Dyn today to learn how a supplemental DNS service can help you optimize DNS performance and improve user experiences. We can help you determine which multi- DNS option is best for your business and assist with planning and service integration efforts.
Tags : dns, service, management, traffic, vendors, delegation, protocol, traffic
     Oracle Dyn
By: Oracle Dyn     Published Date: Dec 06, 2017
The DNS is an often-overlooked protocol. Historically, many companies believed they could either run their own DNS service in-house or simply use a bundled option provided by their hosting or CDN provider. However, with the rise in DDoS attacks and continued migration to the cloud, the mission-critical nature of the DNS has become quite apparent to companies around the world. As a result, many are searching for a managed DNS provider.
Tags : dns, vendors, dns, ddos, attack, cyber security
     Oracle Dyn
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com