• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

abs

Results 401 - 425 of 521Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management, anti spam
    
McAfee
By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn
    
Astaro
By: Apple Corporation     Published Date: Nov 14, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free.
Tags : 
ipad, apple, mobile, deployment, mission-critical apps
    
Apple Corporation
By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : 
mdm, mobile device management, deployment, ipad, business solutions, apple, mobile computing
    
Apple Corporation
By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : 
ipad, apple, business solutions, seminar, apps, ipad apps, it security, security
    
Apple Corporation
By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
    
Q1 Labs
By: Symantec     Published Date: Aug 09, 2013
Anti-virus software is a crucial piece of any organization’s security strategy. However, sifting through the marketing hype and finding the product that truly delivers the best security can be challenging. This independent research report on enterprise anti-virus protection tests five of today’s best-known anti-malware products to help your organization evaluate which would work best in your enterprise. View now to uncover who came out on top when tested upon accuracy, protection, false positives, and more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
By: Symantec     Published Date: May 02, 2014
Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
Symantec
By: Riverbed     Published Date: Jul 15, 2014
Organizations have gained significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organizations would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes. Riverbed and VMware joined forces to help eliminate those problems and make it easier to deploy VXLAN overlay networks in highly virtualized data centers by integrating application-aware network performance management software and vSphere 5.1
Tags : 
performance, management, software, networks, virtualizing servers, storage, backup and recovery, storage virtualization
    
Riverbed
By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
    
AlienVault
By: AlienVault     Published Date: Oct 21, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
security, operations, affordability, av labs, open threat, exchange, analyst, report
    
AlienVault
By: Riverbed     Published Date: Sep 05, 2014
Organizations have gained significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organizations would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes. Riverbed and VMware joined forces to help eliminate those problems and make it easier to deploy VXLAN overlay networks in highly virtualized data centers by integrating application-aware network performance management software and vSphere 5.1.
Tags : 
performance management, networking, software, virtualization, architecture, servers, enterprise applications
    
Riverbed
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm, firewalls, intrusion prevention, web service security, data protection
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security, network security, application security, firewalls
    
Citrix Systems, Inc.
By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : 
messagelabs, email security, web security, virus, spam, spyware, phishing
    
MessageLabs
By: MessageLabs     Published Date: Jul 16, 2009
This White Paper explains what image spam is and how it tries to escape detection. But it also describes how the filter provided by MessageLabs hosted services uses subtle clues to expose image spam - and so delivers a cost-effective solution to what can be an irritating and business-compromising problem. Learn more today!
Tags : 
messagelabs, threats, spam, image spam
    
MessageLabs
By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection, security
    
Thawte
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Email is the nervous system of most companies. It answers everyday questions. What do I do next? What did we agree? What happened? How did we do it last time? Who do I need to talk to?
Tags : 
messagelabs, complete email safeguard, managing email, security, backup and recovery, business continuity, disaster recovery, email security
    
MessageLabs Ltd.
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Our analysis shows 25% of internet bandwidth can be lost to employee misuse, streaming media & spam. Understand bandwidth wastage in your business & steps you can take to control it.
Tags : 
messagelabs symantec, internet bandwidth, it management, tco, bandwidth management, network management, total cost of ownership
    
MessageLabs Ltd.
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware, anti spam, anti spyware, anti virus, email security
    
MessageLabs Ltd.
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
MessageLabs Ltd.
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter