prevention

Results 51 - 75 of 508Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: TriNet     Published Date: Jul 28, 2015
Identifies the foundational risks that can distract executives from focusing on and achieving their business' goals, and offers recommendations for eliminating those risks altogether.
Tags : 
foundational risks, risk elimination, selection process, compensation practices, performance management system, harassment prevention, best practices, entrepreneurship management, employee performance, infrastructure
    
TriNet
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : 
security, endpoint, zero day exploit, forrester, phishing, ddos
    
Palo Alto Networks
Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices, network architecture, network performance, network performance management, network provisioning, network security, business intelligence
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: Namogoo     Published Date: Jul 11, 2017
This report helps e-commerce companies understand the scale and scope of the “Online Journey Hijacking” phenomenon, where your customer’s online journey is disrupted, and your revenue is impacted, by third-party product ads cause by client-side Digital Malware.
Tags : 
ecommerce optimization, conversion rate optimization, ecommerce, online customer journey, online journey hijacking, digital malware, ad injections
    
Namogoo
Published By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : 
smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Gigamon     Published Date: Dec 13, 2018
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Quick-to-deploy protection for remote locations.
Tags : 
firewall, firewall protection, it security, intrusion prevention systems
    
McAfee
Published By: Carbonite     Published Date: Oct 10, 2018
Overview Key Challenges Organizations still struggle with communication between data owners and those responsible for administering DLP systems, leading to technology-driven — rather than business-driven — implementations. Many clients who deploy enterprise DLP systems struggle to get out of the initial phases of discovering and monitoring data flows, never realizing the potential benefits of deeper data analytics or applying appropriate data protections. DLP as a technology has a reputation of being a high-maintenance control — incomplete deployments are common, tuning is a never-ending process, lack of organization buy-in is low, and calculations of ROI are complex.
Tags : 
    
Carbonite
Published By: Fiserv     Published Date: Sep 14, 2017
Sanctions screening and fraud prevention solutions use real-time detection to prevent terrorist financing and financial crime; whereas anti-money laundering (AML) primarily follows an “observe and report” process. Such a process is all that is currently required by many regulators. Increasingly though, international compliance teams are choosing to stop transactions before they are executed – based on suspicions of money laundering activity. More and more, the industry has been asking itself if this approach of rejecting suspicious activity is a more effective strategy to prevent money laundering. This paper explores where and why AML real-time detection might make sense as a new paradigm for global financial institutions.
Tags : 
aml, anti-money laundering, compliance, regulatory compliance, financial crime, financial crimes, financial action task force, fatf, customer due diligence, cdd, aml monitoring solutions, currency transaction reporting
    
Fiserv
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : 
cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting, cash reconciliation, cash transaction, fraudulent currency, counterfeit detection, counting errors, shrinkage, reconciliation
    
Fiserv
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Complete enterprise security requires coordination. Firms must integrate the technologies and data that come from the endpoint and network layers to make accurate decisions that ensure optimal threat detection, containment, and remediation. Unfortunately, too many firms rely on a huge variety of solutions that require manual integration and correlation, leading to wasted time and poor threat detection. Security leaders must automate these processes to eliminate detection lag and improve prevention efforts.
Tags : 
    
Cisco DWA Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.