prevention

Results 276 - 300 of 525Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Jul 08, 2015
A key to safeguarding data and apps is finding the right partner.
Tags : 
security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
An effective data loss prevention program requires the right technologies and policies in place and working together.
Tags : 
dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
Addressing vulnerabilities in this growing risk environment.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices
    
CDW
Published By: Kaseya     Published Date: Apr 04, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
Kaseya
Published By: McAfee     Published Date: Apr 14, 2014
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway
    
McAfee
Published By: McAfee     Published Date: Aug 14, 2014
Read this report to get a solid overview of Advanced Evasion Techniques (AET) and how they behave, along with some brilliant Industry Insights.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
McAfee
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : 
tyco, security, commercial, loss prevention
    
Tyco Integrated Security
Published By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : 
technology, security, best practices, solutions, network management, detection, protection, software compliance
    
Cyphort
Published By: LogRhythm     Published Date: Feb 22, 2018
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defenses with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
    
LogRhythm
Published By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Feb 22, 2017
Refuse to surrender to cybercriminals—learn the best ways to prevent a ransomware infection, and what you can do in the event of an attack.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: Carbonite     Published Date: Feb 22, 2017
Find out how a lack of preparation puts businesses at risk from ransomware—and get expert advice on how to protect your data.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: McAfee     Published Date: Mar 31, 2017
Gartner, Inc. has positioned McAfee as a Leader in the Gartner Magic Quadrant for Intrusion Prevention Systems (IPS) for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Get access to this valuable Gartner research, $1,995.00 USD value, compliments of McAfee.
Tags : 
gartner mq, gartner magic quadrant, intrusion prevention systems, vips, ips, magic quadrant ips
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: Proofpoint     Published Date: May 17, 2017
In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.
Tags : 
proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security
    
Proofpoint
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
HP
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
Streamline your endpoint security stack and your team's workload with predictive, AI based, pre-execution malware protection plus prevention based EDR. CylancePROTECT combined with CylanceOPTICS = real-time, predictive threat prevention.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
The application of AI within the cybersecurity market is transforming the industry. AI based threat prevention delivers previously unheard of operational efficiency, ROI, and efficacy.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
AV-TEST performed an advanced threat prevention test of enterprise endpoint protection software to evaluate and compare its ability to detect and prevent new and unknown malicious executables.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
The Forrester Consulting report provides a framework to evaluate the potential financial impact and benefits of investing in a prevention based cybersecurity strategy with Cylance.
Tags : 
    
BlackBerry Cylance
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.