it protection

Results 526 - 550 of 1576Sort Results By: Published Date | Title | Company Name
Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection, cybercrime, anti virus, authentication, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
ESET
Published By: Dell Storage     Published Date: Nov 02, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery, infrastructure, best practices, data quality, database security, productivity, project management, cloud computing, virtualization, design and facilities
    
Dell Storage
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection, identify protection, authentication, fraud, identity management, internet security, intrusion detection, intrusion prevention, security policies
    
LifeLock
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. Call me to learn about the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, security, identity threat, authentication, it security, access control, identity management, intrusion detection, intrusion prevention, security policies
    
LifeLock
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : 
security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security
    
Splunk
Published By: WatchGuard     Published Date: Oct 16, 2012
Network security may be old-school, but it is not passé; the right perimeter protection means more threats stay outside & more data stays inside. Learn more about capabilities that are available in a modern network perimeter UTM solution.
Tags : 
utm, watchguard, unified threat management, market research, report, security, infrastructure, data management
    
WatchGuard
Published By: Symantec     Published Date: Oct 25, 2012
PassMark Software conducted objective performance testing on five publicly available Enterprise Endpoint Protection products. This report presents our results from these performance tests.
Tags : 
endpoint security, endpoint protection products, symantec, technology security, data security, security
    
Symantec
Published By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security, enterprise applications
    
Symantec
Published By: Glasshouse Technologies     Published Date: Oct 31, 2012
Implementing a multi-tiered cloud strategy offers flexibility for protection required for workloads and cost-savings of inexpensive cloud services. Learn how to execute a unified, infrastructure to enable organizations to make the best of cloud.
Tags : 
glasshouse, cloud computing, data center, disaster recovery, infrastructure operations, it consulting, virtualization, infrastructure
    
Glasshouse Technologies
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
In this white paper, HP and Veeam Software outline an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, data center
    
HP - Intel® Xeon® processors
Published By: Viavi Solutions     Published Date: Feb 22, 2018
Is your Network Performance Monitoring and Diagnostics (NPMD) solution a target for attackers? With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. NPMD tools that do not keep pace can leave your information vulnerable.
Tags : 
    
Viavi Solutions
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: HP     Published Date: Nov 05, 2014
HP Proactive Care helps prevent problems and stabilize IT by utilizing secure, realtime, predictive analytics and proactive consultations when your products are connected to HP. Benefits include: • Problem prevention • Predictive analytics for proactive reports • Personalized consultation with a Technical Account Manager • Rapid access to advanced technical experts Download this customer brief now.
Tags : 
proactive care, it stability, problem protection, reduce risks, prevent it issues, care service, gen9, customer brief, it management, business intelligence
    
HP
Published By: ADP     Published Date: May 02, 2018
How do you create competitive advantage and protect it to build a successful organization for the future? Smart organizations are rethinking their strategies: how to elevate the strengths and productivity of their people and identify the right approach to protect their people and data.
Tags : 
talent acquisition, talent activation, security, data protection
    
ADP
Published By: Nasuni     Published Date: Nov 19, 2014
The global architecture and engineering firm Environmental Systems Design, Inc., had enough capacity to handle its data. The challenge was protecting that data. The firm would often have 15TB of data in production at a given time and its existing backup solutions simply could not keep pace. After quickly outgrowing several other systems, ESD turned to Nasuni’s enterprise storage as a service. Now, thanks to Nasuni’s automated backup, which delivers unlimited versioning, fast disaster recovery and an unmatched RPO, IT can stop worrying about backup and focus on its core mission of enhancing business productivity.
Tags : 
automated protection, enhanced productivity, data protection, backup solutions, it management, knowledge management, enterprise applications, data management
    
Nasuni
Published By: Nasuni     Published Date: Nov 19, 2014
When world-class architecture and design firm Perkins+Will needed a high performance storage platform to support their global teams, they turned to Nasuni. With 24 locations around the world, traditional storage and data protection schemes were becoming expensive and difficult to manage. Teams in different locations wanted access to shared project data. Nasuni has allowed Perkins+Will to deploy a high performance storage platform that delivers data protection and synchronization at a fraction of the cost and complexity of any existing solution.
Tags : 
storage management, data protection, data synchronization, it management, knowledge management, enterprise applications, data management
    
Nasuni
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Electronic infant protection systems have, to date, been department-level solutions. A new generation of Wi-Fi technology, however, expands infant protection hospital-wide, presenting new opportunities. This white paper reviews the steps required for healthcare IT professionals to select, design and deploy a Wi-Fi Infant Protection solution, in cooperation with clinical and security peers.
Tags : 
wi-fi, infant protection, hospitals, security, healthcare
    
STANLEY Healthcare
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching, open source vulnerabilities, owasp, cloud security, gartner research report, threat forensics, advanced persistent threat, security
    
Waratek
Published By: MobileIron     Published Date: Feb 12, 2019
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. This paper examines some current mobile threat defense approaches to help organizations understand where traditional solutions may fall short — and how machine learning-based threat defense can expand upon those capabilities by providing immediate, on-device protection against mobile attacks.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of €20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs – offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.