ransomware

Results 1 - 25 of 130Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
     Citrix Systems
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Do you know what your employees are doing on your network? Do you know about the latest ransomware attack your security team is battling? How about your business partners? Are they secure? With all of these questions swirling around in your head, it’s hard to feel secure about network security. But there is one thing that could help: a solid plan. Perhaps you’re aware that your organization should have a formal incident response plan. Or maybe you already have one. But are you completely clear on all the components that should make up such a plan? Or what to do when things go wrong? Or how to get help when you need it? Over the next few pages, we’ll provide you with some insight to help you build and strengthen your organization’s incident response plan.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Telecom Italia (TIM) Headquarters: Milan, Italy Users: 600,000 Objective: As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider TIM sought an innovative solution to effectively and efficiently protect the network and data of its business users. Solution: Cisco Umbrella for Service Providers (SPs) Impact: • Rolled out TIM Safe Web to more than 600,000 customers, with less than 1 in 10,000 customers opting out of the service • Provided TIM with a unique competitive differentiator • Created an incremental revenue stream for TIM
Tags : 
     Cisco Umbrella EMEA
By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: Proofpoint     Published Date: Dec 21, 2018
If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and other advanced malware, credential phishing, email fraud and more. You’re spending more time dealing with a growing volume of threats. And you’re seeing a shrinking return from your security investments. That’s because most of today’s attacks play off human weaknesses. Download this whitepaper today to find out the top tips on how to choose tools and solutions to improve behaviours and outcomes.
Tags : 
     Proofpoint
By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : email security, ransomware, spear-phishing, cyber resilience, symantec
     Mimecast
By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : healthcare, ransomware, ransomware attack, seg, secure email gateway
     Mimecast
By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
     Akamai Technologies
By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
     Veeam '18
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. The problem is that every single business that pays to recover their files is directly funding the development of the next generation of ransomware. As a result, ransomware is evolving at an alarming rate with new and more sophisticated variants. This makes defending your organization's data against ransomware more critical than ever. But where do you start? Lots of questions come to mind. We've got the answers.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
“Does Cisco Umbrella block ransomware?” This is one of the most common questions that we hear from customers. In reality, the answer for any security provider — including Cisco — is seldom an absolute “yes” or “no.” It really depends on how each variant arrives onto your systems, as well as its order of operations for encrypting data for ransom. However, with Cisco you can significantly reduce the number of ransomware infections across your organization.
Tags : 
     Cisco Umbrella EMEA
By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Damaging widespread attacks such as WannaCry provide grim reminders of how prevalent Ransomware attacks have become. Adversaries are not only launching Ransomware attacks against a wide range of industries, they are consistently evolving their tools, tactics and procedures (TTPs) to foil your organization’s best cybersecurity strategies. A white paper, “Ransomware, a Growing Enterprise Threat,” offers in-depth analysis of Ransomware and explains why organizations can’t afford to ignore this increasingly challenging cyber threat. Download this white paper to learn • The evolution of Ransomware and why businesses are being targeted more frequently • How perpetrators tactics and targets are evolving to maximize profits • Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
     CrowdStrike
By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
     AuditBoard
By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
     Dell EMC EMEA
By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
     Carbonite
By: Zerto     Published Date: Oct 08, 2018
This infographic summarizes the growing threat of ransomware, what the potential impact could be on your business, and how you can mitigate the threat of ransomware by following a few simple steps and learn to recover you data in minutes with Zerto.
Tags : ransomware, it resilience
     Zerto
By: Zerto     Published Date: Oct 08, 2018
"Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 eBook will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure. This 101 guide will educate you on topics like: How to evaluate replication technologies Measuring the cost of downtime How to test your Disaster Recovery plan Reasons why backup isn’t Disaster Recovery Tips for leveraging the cloud Mitigating IT threats like ransomware Get your business prepared for any interruption, download the Disaster Recovery 101 eBook now!"
Tags : disaster recovery, dr strategy, ransomware
     Zerto
By: Lenovo     Published Date: Aug 31, 2018
? Security threats are growing at an astronomical pace–theft, hacking, malware, ransomware... and the list goes on. That's why Lenovo integrates security at every level including built-in hardware, advanced software, a secure supply-chain, complete component validation and integrated services. In addition to Lenovo's own security features built into each device, Windows 10 Pro delivers comprehensive, built-in and ongoing security protections you can trust – including Windows Hello, Windows Defender Antivirus, firewall, and more. Read more in this comprehensive product guide, from personal device to data center, we'll show you how we're hard at work securing your devices from the threats.
Tags : 
     Lenovo
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com