mitigate

Results 201 - 225 of 266Sort Results By: Published Date | Title | Company Name
Published By: Dyn     Published Date: Jan 14, 2015
A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?
Tags : 
mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based
    
Dyn
Published By: Dyn     Published Date: Jan 14, 2015
Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.
Tags : 
ddos attack, integration, mitigation, ddos outage, business protection, business security, infrastructure, ddos
    
Dyn
Published By: Tripwire     Published Date: Jun 30, 2009
Since the adoption of SOX, much has been learned about IT compliance. Discover how to make SOX efforts more effective in "Sustaining Sox Compliance."
Tags : 
tripwire, sustain, sox, compliance, practice, risk, control, data
    
Tripwire
Published By: IBM     Published Date: Aug 05, 2014
IBM® InfoSphere® Master Data Management (MDM) helps organizations gain a comprehensive and accurate 360-degree view of their customers. This 360-degree view, when integrated with a CRM solution such as Salesforce.com, helps organizations improve the effectiveness of their CRM initiatives to help companies: -Increase user productivity -Improve sales and marketing performance to increase win rate and revenue -Mitigate risks associated with poor customer data Download here to learn more!
Tags : 
ibm, salesforce, mdm, crm, initiatives, data, it management, data management
    
IBM
Published By: Gomez IT     Published Date: Dec 14, 2011
So how can you ensure that your selection process for cloud service providers and partners is fast but well-informed, based on reliable data and mitigates the risk of hidden surprises? Read to find out.
Tags : 
gomez, technology, cloud computing, cloud service provider, security, roi, security management, business intelligence
    
Gomez IT
Published By: IBM     Published Date: May 12, 2017
In today’s world, the data is flowing from all directions: social media, phones, weather, location and sensor equipped devices, and more. Competing in this digital age requires the ability to analyze all of this data, and use it to drive decisions that mitigate risk, increase customer satisfaction and grow revenue. Using a combination of proprietary software and open source technology can give your data scientists and statisticians the analytical power they need to find and act on insights quickly. IBM® SPSS® Statistics provides all of the data analysis tools you need, and integrates with thousands of R extensions for maximum power and flexibility. In this next Data Science Central Webinar event, we will show how SPSS Statistics can help you keep up with the influx of new data and make faster, better business decisions without coding.
Tags : 
ibm, spss, data analysis, statistics, risk mitigation
    
IBM
Published By: Arbor Networks     Published Date: Mar 13, 2015
Having the right tools and establishing key processes in advance can help prevent or mitigate the impact of a DDoS attack. Learn more by downloading this complimentary toolkit with research and best practices from Gartner and Arbor Networks.
Tags : 
arbor, arbor networks, ddos, denial of service, ddos attack, cloud ddos protection, network security, web service security
    
Arbor Networks
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
Cisco
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security
    
Cisco
Published By: IBM     Published Date: Oct 10, 2013
Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bank’s need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.
Tags : 
ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding
    
IBM
Published By: Cisco     Published Date: Sep 16, 2015
Optimize Your Architecture and IT Investment While Reducing Complexity and Risk
Tags : 
applications, systems integration, cloud, development, network architecture, network management, network performance, data center design and management
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management, security, productivity
    
Cisco
Published By: DocuSign     Published Date: Apr 24, 2018
Moreover, more than half of Fortune 500 pharmaceutical and medical device companies are operating under corporate integrity agreements (CIA) with the U.S. government to mitigate the risks.
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jul 05, 2012
There are significant cost and performance advantages in migrating from Oracle or HP platforms to Power Systems. In order to mitigate the risks in moving, IBM offers a Migration Factory to partner with clients throughout their transition. Read the white paper to learn more about the advanced tools, metrics and workshops available with this service.
Tags : 
ibm, technology, project management, automation, platform, migration factory, power systems, application performance management
    
IBM
Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business intelligence, cloud computing
    
CloudFlare
Published By: Rapid7     Published Date: Jan 10, 2013
In a January 2012 market research study, 71 percent of the businesses surveyed said that mobile devices have caused an increase in security incidents.
Tags : 
security, network security, cloud, mobile, cloud, byod, mobile computing, mobile workers
    
Rapid7
Published By: Rapid7     Published Date: Oct 15, 2013
This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.
Tags : 
rapid7, risk, security, real-time, infrastructure, intrusion detection, intrusion prevention, mobile computing
    
Rapid7
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot, anti virus
    
Arbor Networks
Published By: SPSS     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the technology sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the marketing sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence
    
SPSS, Inc.
Published By: Cisco     Published Date: Aug 18, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.
Tags : 
mitigate, threats, detect, affordability, solution, deliver, security, visibility
    
AlienVault
Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping
    
distilnetworks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.