RecruitingBlogscom

Follow Us:

 

security protection

Results 301 - 325 of 807Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jan 31, 2013
Tolly benchmarked the performance of four top endpoint security vendors within VMware vSphere 5 virtual environments. Read the report to discover which solutions were the fastest.
Tags : 
virtualization, vmware, test, antivirus, security, protection
    
Symantec
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
Cloud computing has become another key resource for IT deployments, but securing applications and data in the cloud remains a concern. Learn strategies for keeping your most precious assets safe, no matter where they reside.
Tags : 
cloud computing, cloud security, protection data in the cloud, cloud data protection, cloud deployment, application protection in the cloud, authentication, aaa, secure remote access, web application firewalls, application security, business technology
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access from anywhere, at any time, on any device. Read this paper to learn why applications fail, why network load balancing alone offers little protection, and why context-aware application delivery is so critical to making mission-critical applications highly available, fast and secure.
Tags : 
network, load balancing, application awareness, resource, context-aware application delivery
    
F5 Networks Inc
Published By: M86 Security     Published Date: Dec 01, 2010
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : 
m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement
    
M86 Security
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications
    
Oracle
Published By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
    
Tripp Lite
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
Published By: Acronis EMEA     Published Date: May 18, 2015
This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.
Tags : 
backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types, recovery tools, data backup
    
Acronis EMEA
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Traditional security infrastructures can't keep up with the growing complexity of today's distributed networks. To power true digital transformation via the cloud, you need to integrate connectivity and security in a way that allows for higher productivity, reduced costs, and easier compliance. Download our eBook to learn about a better approach to cloud security, including how to augment or replace expensive MPLS, the types of security needed for holistic protection, and the advantages of an integrated solution instead of a patchwork of point products.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a “Top Player” for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a “Top Player” in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, ”Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection.” They also cited that, “Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoint’s solution is leading edge.”
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber, ciso, experts, ebook
    
Tenable
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top