Skip to main content
 

secure gateway

Results 1 - 25 of 75Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Apr 26, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
    
Amazon Web Services
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
In seinem Buch „Die Psychologie der Wissenschaft“ von 1966 vertrat der US-Psychologe Abraham Maslow die Position, dass Psychologen multiperspektivische Behandlungsansätze verfolgen und neue Konzepte einführen sollten, statt weiter nur die Theorien von Verfahren anzuwenden, die Freud und seine Nachfolger vor langer Zeit entwickelt hatten. Maslow wusste, dass es schwierig ist, einen neuen Blickwinkel einzunehmen, und schreibt: „Es ist bestechend, in jedem Problem einen Nagel zu sehen, wenn man als Werkzeug nur einen Hammer hat.“ Wir alle kennen das. Wir gewöhnen uns so sehr an althergebrachte Abläufe, dass wir die Gründe dafür manchmal nicht infrage stellen.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Sie müssen stets für das kontinuierliche Wachstum Ihres Unternehmens sorgen. Im Zuge der anhaltenden Dynamik der Application Economy setzen Sie zur Förderung dieses Wachstum vermutlich auf digitale Unternehmensinitiativen. Wie organisieren und verwalten Sie nun am besten ein APIProgramm, ohne Ihr geistiges Eigentum außerhalb des Unternehmens auf problematische Weise zu exponieren? Nachfolgend stellen wir eine Reihe von Early Adopters vor, die ihr Wachstum erfolgreich mit APIs befördert haben.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Die Application Economy hat Unternehmen zu Umstellungen gezwungen. Unternehmen machen ausgewählte Daten und Anwendungen für Entwickler, Partner, Mobile Devices, die Cloud und das Internet of Things (IoT) zugänglich, um neue Wachstumschancen wahrzunehmen. Im Zuge dieser Umstellungen zeigte sich, dass Legacy-Daten in der Application Economy von Nutzen sein können, und zwar in einem solchen Ausmaß, dass sich durch die neue Art der Verwendung dieser Daten neue Umsatzchancen ergeben.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
CA Live API Creator enthält die drei Dinge, die für jeden Anwendungsprototyp erforderlich sind: • Datenbank • Geschäftslogik • Benutzeroberfläche Datenbank – Ihre oder unsere Sie können Ihre vorhandene Datenbank oder eine von CA Live API Creator für Sie erstellte Cloud-Datenbank verwenden. In beiden Fällen sind Sie schnell einsatzbereit.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
In der digitalen Wirtschaft sind Anwendungsprogrammierschnittstellen (APIs) unerlässlich, um Ideen schnell umzusetzen und neue Geschäftschancen zu nutzen. Sie sind die Bausteine der digitalen Transformation und ermöglichen es Unternehmen, eine herausragende Customer Experience bereitzustellen, neue Umsatzquellen zu erschließen und Mitarbeiter, Partner, Anwendungen und Geräte jederzeit und überall mit Daten zu verbinden.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: Symantec     Published Date: Jul 09, 2017
This paper provides a brief recap of the functionality provided by web proxies, why proxy architecture is still a vital building block for a comprehensive web defense, and how web proxies can work with other solutions such as next-gen firewall (NGFW) to deepen the organization’s defenses against advanced web-based threats.
Tags : 
cybercrime, swg, secure web gateway, firewall, security., threat and vulnerability management
    
Symantec
Published By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud applications, swgs, secure web gateway's, saas
    
Symantec
Published By: IBM     Published Date: Jun 07, 2017
Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. You’ll learn about: · Operating a single, secure B2B integration gateway · Simplified onboarding and partner management. · High availability business operations and disaster recovery · Adaptable capabilities to help react to changes to your business processes · Visibility and analytics that provide actionable insight over those processes · Supporting a mix of hybrid deployment models including on-premises and cloud
Tags : 
b2bi, ibm, b2b integration, modernization, b2b architechture
    
IBM
Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast
Published By: Entrust Datacard     Published Date: Oct 24, 2016
All of these elements of growing connectivity have the potential to significantly increase productivity, streamline operations and enhance service levels to citizens and stakeholders. But these benefits are only one side of the story. The added complexity of the new eGovernment environment also creates many new challenges, as government agencies search for effective ways to secure and control access to the rapidly growing number and variety of gateways to their ecosystems.
Tags : 
    
Entrust Datacard
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, data security, risk management, data management, identity governance
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, identity governance, security, protection
    
IBM
Published By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution, advanced malware protection, amp, endpoints, mobile devices, virtual environments
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.