Skip to main content
 

sans

Results 76 - 100 of 150Sort Results By: Published Date | Title | Company Name
Published By: Extreme Networks     Published Date: Sep 26, 2014
Les établissements hospitaliers sont aujourd’hui soumis à des pressions financières et techniques pour améliorer le traitement du patient et augmenter leur productivité. Un réseau filaire et Wi-Fi hautement sécurité et fiable est le minima requis pour supporter les données, la voix, la vidéo et les équipements et les applications métiers. Mais comment garantir continuité de service et connectivité Wi-Fi pervasive pour supporter ces éléments clés au meilleur coût ? Ce livre blanc vous guide grâce aux témoignages de professionnels de l’IT au sein de grands établissements hospitaliers. Ils y expliquent comment ils ont relevé le challenge de la mobilité en garantissant la sécurité de leurs patients.
Tags : 
extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview, santé
    
Extreme Networks
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
    
McAfee EMEA
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge™ servers.
Tags : 
dell, migrating dell poweredge, microsoft windows server 2008
    
Dell Windows Server
Published By: Dell Storage     Published Date: Jan 16, 2009
With the advent of iSCSI as the standard for networked storage, businesses can leverage existing skills and network infrastructure to create Ethernet-based SANs that deliver the performance of Fibre Channel—but at a fraction of the cost. iSCSI enables block-level data to be transported between a server and a storage device over an IP network. An iSCSI initiator is hardware or software that runs on a host and initiates I/O to an iSCSI target, which is a storage device (usually, a logical volume) that responds to read/write requests.
Tags : 
dell, iscsi, networked storage, initiator implementations, block-level data, fibre channel
    
Dell Storage
Published By: Dell Storage     Published Date: Jan 16, 2009
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. One advanced SAN configuration involves booting servers directly from the SAN, eliminating all locally attached storage, and improving server operations. Several server boot options are available. To select the right boot option for your environment, you should weigh the benefits and drawbacks of each.
Tags : 
dell, san, storage area networks, consolidated storage, storage management, san configuration, server operations
    
Dell Storage
Published By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : 
dell, san, storage area networks, component failures, data loss, reliable san, building san, raid
    
Dell Storage
Published By: Cisco     Published Date: Jan 28, 2009
Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : 
small office network, cisco, switches, routers, multiple devices, multiple networks, integrated messaging, voip
    
Cisco
Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration
    
McAfee
Published By: McAfee     Published Date: Aug 14, 2014
Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
Intel Security
Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas
    
Evident.io
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since last year’s SANS cloud security survey, “Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.” To learn more, get the full SANS report.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Web applications have recently emerged as a top cybercriminal attack vector, and organizations that don’t take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still don’t have an application security program in place – what can you do to make sure you’re protected? Consult this informative survey today to discover your peers’ proven practices for app security success, and learn what you can do to stay protected – read on to get started.
Tags : 
qualys, sans, sans survery, application, application security, web applications, web applications security, cybercriminals, app security, application security program, protection, customer facing web applications, vulnerability management
    
Qualys
Published By: SubscriberMail     Published Date: Dec 12, 2008
The growing complexity of today's email market has created a deeper need to carefully consider the creative aspects of your email messages. While the need for quality and effective design has always existed from a pure marketing standpoint, challenges unique to the email space require a different look at creative from the perspective of accomplishing specific goals via email. This white paper introduces several of the numerous critical parameters that should be given consideration when preparing email creative, and provides real-world tactics to optimize email creative for maximum results. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : 
subscribermail, email creative, email copy, email marketing
    
SubscriberMail
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
    
Palo Alto Networks
Published By: VMware     Published Date: Apr 11, 2011
This white paper describes the advantages of scale-out iSCSI storage in four areas-cost, high availability and disaster recovery, performance, and management-and illustrates how SANs provide better overall support for virtualized environments.
Tags : 
vmware, storage, server virtualization, disaster recovery, storage area network, ip sans
    
VMware
Published By: SAS     Published Date: Jun 06, 2018
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
Continuous monitoring (CM) begets a process of continuous improvement that works to reduce attack surface and improve security posture, according to the 2016 SANS survey on CM conducted during the months of July to September. In it, 63% of respondents said CM was improving their security posture.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 08, 2015
Learn what 488 IT professionals have to say in the 2014 Application Security Programs and Practices survey. Results indicate an increase in number of organizations with a formal application security program in place. Approximately 83% of respondents (up from 66%) have an Appsec program in place, and more than 37% (up from 33%) have a program that has been operating for more than five years.
Tags : 
application security programs, it professionals, formal application
    
Qualys
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.