Skip to main content
 

attacks

Results 301 - 325 of 948Sort Results By: Published Date | Title | Company Name
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
Find out by watching the RSA Security Analytics and RSA ECAT on-demand video.
Tags : 
cyber attacks, virtual, security, analytics, ecat
    
EMC Corporation
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
    
Fortinet, Inc.
Published By: Citrix Systems     Published Date: Jul 25, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2016.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat. It explains how the Citrix® NetScaler® application delivery controller (ADC) provides a robust yet highly affordable foundation for an organization’s DoS defenses. Benefits of the NetScaler solution include:
Tags : 
    
Citrix Systems
Published By: FireEye     Published Date: Mar 19, 2013
You have to do FISMA. You must defend against Cyber Threats.
Tags : 
fireeye, ciso, cyber security, fisma, cyber attacks, cyber exploits
    
FireEye
Published By: FireEye     Published Date: Mar 20, 2013
Winning the War Against the New Breed of Cyber Attack.
Tags : 
fireeye, threat protection, cyber attacks, cybercrime
    
FireEye
Published By: FireEye     Published Date: Apr 07, 2013
Malware activity has become so pervasive and attacks so successful at penetrating legacy defenses.
Tags : 
fireye, threat report, malware, threat landscape, legacy defenses, advanced persistent threat, apt
    
FireEye
Published By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management
    
BitSight Technologies
Published By: MobileIron     Published Date: Apr 11, 2018
The enterprise landscape has changed dramatically with the influx of millennials — and their preferred devices — into the workforce. As a result, Macs that were once limited to mostly niche usage are now rapidly expanding their enterprise footprint. These devices require the same level of security and oversight that organizations apply to all of their other devices. Otherwise, the risk of leaving Macs either unmanaged or secured by point products creates security gaps that can leave the enterprise open to cyberattacks and compliance violations. The good news is, MobileIron makes it easy to secure Macs the same way all other devices in the enterprise are managed. No integrations, additional training, or learning curves are involved. The time has come for a modern approach to Mac management that is seamless for end users, improves operational efficiency, and simplifies IT operations across the entire device lifecycle. MobileIron makes it all possible.
Tags : 
macos, modern, work, era, devices, workforce, organizations
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: Mimecast     Published Date: Dec 20, 2018
In February 2018, mandatory database laws went into effect in Australia. ultimately these laws are about protecting average Australians’ data from criminal organizations. Equifax and the Red Cross were recent victims of these attacks. Watch now to learn more about how these laws will affect your business as you make changes to protect your customers’ data.
Tags : 
    
Mimecast
Published By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : 
    
ArborNetworks
Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Today’s DDoS attacks are an easy way to interrupt businesses.
Tags : 
ddos protection, arbor networks, insegment, best practices, policies, data
    
ArborNetworks
Published By: ArborNetworks     Published Date: Mar 29, 2016
Are you able to confidently identify attacks within minutes of looking at an alert?
Tags : 
arbor, security, information, attack, alert, investigative
    
ArborNetworks
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: IBM     Published Date: Jul 27, 2016
Learn how to counter and mitigate more attacks with cyber threat analysis.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.