security controls

Results 1 - 25 of 156Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.
Tags : 
insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management
    
CA Technologies
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
    
Venafi
Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications, access control, anti spam
    
Venafi
Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, access control, anti spam
    
Venafi
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: • Learn about the top SSH vulnerabilities • Discover how to reduce risk of SSH key misuse • Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
    
Venafi
Published By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : 
forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security
    
ForeScout
Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Juniper Networks     Published Date: Oct 19, 2015
Next-Generation Firewalls Deliver Better Protection Through Application-Aware Security and User Role-Based Controls.
Tags : 
juniper, firewall, application, security, protection, data, network, firewalls
    
Juniper Networks
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.