RecruitingBlogscom

Follow Us:

 

security technology

Results 1 - 25 of 432Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : 
healthcare, information security, web security, data management, technology, cloud services, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Aladdin     Published Date: Aug 21, 2009
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
Tags : 
spyware, malware, antispyware, anti-spyware, anti spyware, email security, aladdin, security
    
Aladdin
Published By: Alert Logic     Published Date: May 23, 2019
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : 
alienvault, security, soc, hacking, threat detection
    
AlienVault
Published By: AlienVault     Published Date: Nov 10, 2015
Changing security landscape.
Tags : 
managment, security, data, technical comparison, siem technology
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Aria Systems     Published Date: Jun 15, 2016
"Discover the technological solutions to deliver better patient outcomes From patient satisfaction to mobility to security, technology’s role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now >"
Tags : 
    
Aria Systems
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner evaluates a variety of networking vendors providing access layer connectivity. Vendors must have an end-to-end hardware solution, but increasingly, vendor differentiation centers on network services, including guest access, onboarding, security and management tools. Read this whitepaper for more information.
Tags : 
wireless lan, infrastructure, hardware solution, network services, security, technology, best practices, networking, wireless, business technology
    
Aruba Networks
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : 
smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology, access control, networking, security, wireless, business technology
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 20, 2013
Given the evolution of past major advances in wireless-LAN technologies, it should come as no surprise that products based on the still-in-development IEEE 802.11ac standard are now appearing across the board, from residence to enterprise. Just as was the case with 802.11g and 802.11n, the standards-development process is now far enough along that the semiconductor community is shipping in volume, the Wi-Fi Alliance has been able to issue an initial interoperability specification, and system-vendor products offering up to 1.3 Gbps are now available at prices very close to those of 802.11n APs but with on the order of a 30% improvement in price/performance on a spectral-efficiency basis and from 100% to more than 200% in performance overall.
Tags : 
security, assurance strategies, initial deployment, wireless-lan, wi-fi, gbps, enterprise, best practices, technology, business technology
    
Aruba Networks
Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd, quantum key distribution, security
    
AT&T
Published By: Avaya     Published Date: Jun 15, 2016
Discover the technological solutions to deliver better patient outcomes From patient satisfaction to mobility to security, technology’s role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.
Tags : 
technology, best practices, healthcare, info graphics, skyrocket
    
Avaya
Published By: AWS     Published Date: Nov 15, 2018
"Cloud migration can be fraught with inevitable speed bumps. IT management must keep pace while infrastructures grow more complex, and security teams must safeguard their organization’s posture even as they relinquish control over some key technology—all while business teams must continue to predict and manage costs along the way. There are ways to navigate this process more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful, including: • How to make the transition to the cloud as seamless as possible • Why you need full visibility into your infrastructure before, during, and after migration • How IT, security, and operations teams can maximize the ROI from moving to the cloud"
Tags : 
    
AWS
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
Cloud migration can be fraught with inevitable speed bumps. IT management must keep pace while infrastructures grow more complex, and security teams must safeguard their organization’s posture even as they relinquish control over some key technology—all while business teams must continue to predict and manage costs along the way. There are ways to navigate this process more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful, including: • How to make the transition to the cloud as seamless as possible • Why you need full visibility into your infrastructure before, during, and after migration • How IT, security, and operations teams can maximize the ROI from moving to the cloud
Tags : 
    
AWS - ROI DNA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top