prevention

Results 251 - 275 of 508Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
ibm, security, identity management, insurance fraud, data protection, risk management, access control, application security, authentication, intrusion detection, intrusion prevention
    
IBM Software
Published By: IBM Software     Published Date: Oct 24, 2011
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
    
Lumension
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture, monitoring
    
NetIQ
Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Energy Management solution.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization, backup and recovery, design and facilities, power and cooling
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 30, 2011
The demonstrations included in this menu interface show how IBM Tivoli Provisioning Manager solutions can help you manage the complete life cycle of your data center and distributed resources from initial provisioning to patching and configuration maintenance to resource re-purposing or end of life.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization, backup and recovery, intrusion detection, intrusion prevention, cloud computing, vulnerability management, power and cooling
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 30, 2011
Learn about benefits and features of Tivoli Workload Automation Portfolio. Refer to product demos and additional features to know more about specific features, functions and how this portfolio can benefit your organization.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, tivoli, workload, automation, demos, power and cost savings, energy optimization, backup and recovery, application security, internet security, intrusion detection, intrusion prevention
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 30, 2011
IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization, backup and recovery, compliance
    
IBM Corporation
Published By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
data, mining, detect, insurance, fraud, insurers, fraudulent, claims, insurance, data, mining, techniques, audit, analytical, techniques, fraud, detection, it management, data management, finance
    
IBM
Published By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : 
dlp, data loss, security, best practices, access control, authentication, identity management, security management, security policies, vulnerability management
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
Keep data safe, even as it moves outside the perimeter of the traditional network.
Tags : 
security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management, security policies
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
A key to safeguarding data and apps is finding the right partner.
Tags : 
security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies, access control, security management, security policies
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
An effective data loss prevention program requires the right technologies and policies in place and working together.
Tags : 
dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
Addressing vulnerabilities in this growing risk environment.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices, security management, security policies
    
CDW
Published By: Kaseya     Published Date: Apr 04, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management
    
Kaseya
Published By: McAfee     Published Date: Apr 14, 2014
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, ngips, next generation ips, next gen firewall, next gen ips, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway, mcafee email gateway, it management
    
McAfee
Published By: McAfee     Published Date: Aug 14, 2014
Read this report to get a solid overview of Advanced Evasion Techniques (AET) and how they behave, along with some brilliant Industry Insights.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
McAfee
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : 
tyco, security, commercial, loss prevention
    
Tyco Integrated Security
Published By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : 
technology, security, best practices, solutions, network management, detection, protection, software compliance
    
Cyphort
Published By: LogRhythm     Published Date: Feb 22, 2018
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defenses with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
    
LogRhythm
Published By: Carbonite     Published Date: Feb 22, 2017
Refuse to surrender to cybercriminals—learn the best ways to prevent a ransomware infection, and what you can do in the event of an attack.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery, disaster recovery, hacker, computer hacking, malware, ransomware, ransomware attack, ransomware defense, ransomware infection, ransomware preparedness, ransomware prevention, ransomware protection
    
Carbonite
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.