Skip to main content
 

custom defense

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
Published By: Pega     Published Date: Apr 04, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
    
Pega
Published By: Arbor     Published Date: Mar 13, 2014
In this white paper, we’ll examine how the Pravail® portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.
Tags : 
arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers, increase competitive edge, cyber attackers, pravail portfolio, pravail solutions, attack intelligence, enterprise defense
    
Arbor
Published By: SAP     Published Date: Nov 22, 2017
In today’s market, discrete manufacturers must stay focused on traditional objectives — increasing uptime and throughput in the plant and closely managing costs throughout their operations. At the same time, they must also create and offer more integrated products and services and even new business models to enhance the customer experience. These new offerings incorporate increasing amounts of technology — including Internet of Things. Indeed, by 2018, nearly one-third of industry leaders will be disrupted by competitors that are digitally-enabled. For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing.
Tags : 
market, traditional objectives, uptime, plant, managing, costs, operations, offerings
    
SAP
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: Trend Micro     Published Date: Jul 08, 2013
Superior Detection with Trend Micro Custom Defense
Tags : 
apt, c&c, communication, apts, defense, trend micro
    
Trend Micro
Published By: MobileIron     Published Date: May 07, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages.
Tags : 
mobile, threat, defense, security, mobileiron, cyber, criminal
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : 
mobile, threat, defense, strategy, mobileiron, innovation
    
MobileIron
Published By: Symantec     Published Date: Dec 13, 2017
Enterprise’s are increasingly under threat from sophisticated attacks. In fact, research has found that threats dwell in a customer’s environment an average of 190 days1. These Advanced Persistent Threats use stealthy techniques to evade detection and bypass traditional security defenses. Once an advanced attack gains access to a customer environment the attacker has many tools to evade detection and begin to exploit valuable resources and data. Security teams face multiple challenges when attempting to detect and fully expose the extent of an advanced attack including manual searches through large and disparate data sources, lack of visibility into critical control points, alert fatigue from false positives, and difficulty identifying and fixing impacted endpoints.
Tags : 
investigation, exposure, attacks, endpoints, network, email, cloud, security, symantec
    
Symantec
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Aerospace and Defense companies delivering complex products in competitive markets must overcome many challenges to manage requirements throughout the product lifecycle. Among the most difficult challenges are integrating complex systems engineering processes, promoting collaboration among multiple engineering disciplines and enabling the sharing of intellectual property within globally dispersed teams. Companies seeking a way to efficiently manage product requirements can leverage a comprehensive product lifecycle management (PLM) solution to: • Effectively reuse intellectual property to reduce time to market • Increase product innovation • Improve overall traceability of requirements throughout the product lifecycle This paper will highlight the criteria needed for a comprehensive requirements management solution that incorporates PLM to offer customers a scalable, enterprise-grade solution.
Tags : 
customer, product lifecycle, aerospace, defense, management, plm, dassault
    
Dassault Systèmes
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology
    
CDW-Trend Micro
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Thawte     Published Date: Oct 05, 2015
When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : 
website security myths, customer protection, ever-changing threats, website security
    
Thawte
Published By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : 
distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions, roi, finance
    
Arbor
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Search      

Add Research

Get your company's research in the hands of targeted business professionals.