protection technologies

Results 26 - 50 of 59Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : email security, ransomware, spear-phishing, cyber resilience, symantec
     Mimecast
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Oltre il 90% delle aziende ritiene che il GDPR influenzerà le proprie modalità di raccolta, utilizzo ed elaborazione di dati personali. È uno dei cambiamenti più rivoluzionari apportati al panorama della privacy digitale negli ultimi vent'anni e, nel mese di maggio 2018, il GDPR dell'Unione europea introdurrà sanzioni fino a 20 milioni di euro in caso di mancata compliance.
Tags : gdpr, general data protection regulation, ca technologies, privacy, compliance, protezione dei dati
     CA Technologies EMEA
By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
     Zingbox
By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Sophos
By: Egress ABM Pilot     Published Date: Oct 09, 2017
The EU General Data Protection Regulation (GDPR) represents a significant step change for data protection across EU member states. The EU GDPR also brings with it serious implications for organisations who suffer a breach. People will always make mistakes – and in busy and stressful workplaces such as banks and insurance firms the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive client information remains at risk. This white paper provides financial services organisations with a four-step process to ensure compliance.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     Egress ABM Pilot
By: CrowdStrike     Published Date: Aug 01, 2017
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider,to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.Before initiating a change from your current AV solution read this guide to learn:?How to plan an AV replacement project and the critical elements to consider ?How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions?What prevalent technologies are available and what are the pros and cons of each??How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results?Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
     CrowdStrike
By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : grid computing, oracle, database applications
     Oracle
By: Acronis EMEA     Published Date: May 21, 2015
This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.
Tags : data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security, cloud environments, security
     Acronis EMEA
By: Veeam '18     Published Date: May 03, 2019
Ransomware est une priorité pour de nombreux dirigeants d’entreprise, qui doivent faire face aux conséquences désastreuses d’une attaque réussie. Les conséquences commerciales des interruptions de service causées par des attaques de ransomware peuvent être dévastatrices et font apparaître le besoin de meilleures pratiques et de fonctionnalités dans tout le système informatique, notamment pour la protection des données. La solution Hyper Availability Platform de Veeam répond à ces préoccupations en combinant technologies et solutions permettant de limiter les risques liés aux ransomwares et d’améliorer la récupération en toute sécurité.
Tags : 
     Veeam '18
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nouveau modèle de sécurité qui mérite d’être étudié... et reproduit. Traditionnellement, la sécurité des entreprises a toujours été fondée sur une stratégie de « forteresse », chargée de sécuriser les terminaux utilisateur et de former une barrière de protection autour du réseau. Aujourd’hui, cette stratégie n’est pas en mesure de supporter ou de sécuriser l’utilisation des périphériques mobiles et des fonctionnalités SaaS, qui existent en-dehors de la forteresse. Les responsables de la sécurité des informations (CISO, Chief Information Security Officer) sont donc tenus de trouver de nouvelles solutions à même de sécuriser ces technologies actuelles, et de s’adapter aux menaces et aux besoins métier en évolution.
Tags : 
     CA Technologies EMEA
By: Blue Coat Systems     Published Date: Aug 07, 2012
For anywhere, anytime, any-device mobile engagement, implementing a stateless architecture calls for building protection in the application layer, moving from device management to risk-based device inspection, performing real-time threat detection and mitigation, and leveraging cloud technologies.
Tags : mobility, it security, security & risk, s&r, infrastructure operations, i&o, devices, augmented reality, apps. cloud, virtualization, managed network, remote access, applications
     Blue Coat Systems
By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : white paper, cloud, connected, backup, recovery, hybrid, data, protection, local, restores, offsite, disaster
     EVault Inc.
By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
     McAfee
By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci
     McAfee
By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, mcafee, cyber threat, technologies, innovation, analytics
     McAfee EMEA
By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : endpoint security, data security, endpoint protection, enterprise protection, technology, security
     CDW-Trend Micro
By: CrowdStrike     Published Date: Nov 28, 2018
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? This white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn: • How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware • Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML • How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-gene
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider, to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements. Before initiating a change from your current AV solution read this guide to learn: • How to plan an AV replacement project and the critical elements to consider • How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions • What prevalent technologies are available and what are the pros and cons of each? • How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results • Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
     CrowdStrike
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: Lumension     Published Date: Jun 05, 2015
Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.
Tags : data protection, threats, security landscape, shifting data, data maturity
     Lumension
By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : proxy deployment, firewall, threat detection, threat protection
     Symantec
By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption, security
     Utimaco
Start   Previous    1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com