mitigate

Results 26 - 50 of 266Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack, web security, networking, knowledge management, enterprise applications
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : 
akamai, bots, scrapers, bot traffic, security, cybersecurity, networking, knowledge management, enterprise applications
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: SambaSaftey     Published Date: Mar 15, 2019
Best practices for taking control. The numbers don’t lie: Driver monitoring can reduce accidents, save organizations money, and protect the people and communities you serve. Advances in safety technology, like comprehensive driver monitoring solutions, are enabling companies not only to stay safer, but to better navigate the tricky territory of insurance. By following a few new best practices, you can manage insurance costs and protect your company’s bottom line before your drivers even hit the road. In our free white paper, “Lowering Commercial Automotive Fleet Insurance Costs,” we’ll show you: • The many ways vehicle crashes affect the bottom line • A deeper look at the risks of employer- and employee-owned vehicles • How negligent entrustment suits can snare companies in any industry • How to mitigate risk and take control of insurance
Tags : 
    
SambaSaftey
Published By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Data overload have burdened practically every largescale enterprise today. It’s vital for competitive enterprise not only to find solutions that will deliver the right data at the right time, but also be confident that the data they are looking at is governed and trusted. Sage Business Cloud Enterprise Management enables businesses to gain real-time access to data and make critical business decisions; achieve a better ROI while reducing IT overhead; automate data integration and deliver a 360-degree view of the businesses; mitigate data security risks and comply with legal regulations. Download this whitepaper and discover how to overcome some common challenges of information overload to increase your business insight and visibility.
Tags : 
    
Sage Software (APAC)
Published By: Google     Published Date: Jan 24, 2019
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell & Microsoft
Published By: Dyn     Published Date: Oct 04, 2016
Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection
Tags : 
ddos, dns, cdn, attacks, internet security, ipsec
    
Dyn
Published By: Workday UK     Published Date: Jan 31, 2019
Data privacy and cyber security are now a larger risk and priority for businesses than ever before. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic now.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday UK
Published By: Patsnap     Published Date: Jul 25, 2016
IP data can be used for a lot more than traditional patent searching. In this white paper we look at how the insights from IP can be used to identify and mitigate risks. And we used virtual reality as our guide.
Tags : 
virtual reality, vr headset, oculus rift, head mounted display, immersive experience, microsoft, risk management, analytical applications, virtualization, infrastructure
    
Patsnap
Published By: Gigamon     Published Date: Feb 20, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn about the three biggest threats to mobile applications and the recommendations on how to mitigate the risk from mobile computing security vulnerabilities
Tags : 
mobile application threats, mobile application, mobile, risk, api, anti virus, application security, encryption, firewalls, internet security, security management, vulnerability management
    
HP - Enterprise
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, encryption, firewalls, hacker detection, high availability, identity management
    
Blue Coat Systems UK
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm, cloud computing
    
Dyn
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Published By: Brocade     Published Date: May 02, 2016
By 2020, the Software-Defined Data Center will be a requirement for 75% of the Global 2000’ according to Gartner. But is the SDDC right for you? The key to success is to plan big but start small. This Gartner report will help you understand the value of SDDC, identify the best use cases, and mitigate deployment risks.
Tags : 
    
Brocade
Published By: illusive networks     Published Date: May 18, 2016
The growing need for cyber insurance is undeniable, yet the landscape is currently operating without standards, mostly due to the high number of unknowns regarding cyber risks. As a result, understanding how cyber insurance can help mitigate the costs for your company, if a cyber attack occurs, is quickly emerging as a best practice. Download this whitepaper and learn about what to consider when purchasing a cyber insurance plan, cyber Insurance Coverage: What Is (and Isn't) Covered, How Much Will the Coverage You Need Cost?, and how to step up cyber security efforts.
Tags : 
    
illusive networks
Published By: CA Technologies     Published Date: Jun 26, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, “The Five Essential Capabilities of an Analytics-Driven SOC”, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunk’s, are needed to prevent, detect and respond to attacks in today’s security landscape
Tags : 
    
Splunk
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
Find out why it’s harder than ever to keep data secure, as well as what could be causing security breaches. Plus see how to mitigate this risk using end-to-end solutions in this infographic. Learn how Lenovo’s ThinkShield solutions, combine cutting-edge security solutions to protect your devices from cyber-attack, throughout their lifecycle. Making all the difference with true, end-to-end protection at the device, identity, online and data levels.
Tags : 
    
Lenovo - APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.