• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

threat prevention

Results 1 - 25 of 117Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, security
    
ArborNetworks
By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless, storage
    
Blue Coat Systems
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
By: CDW     Published Date: Jul 08, 2015
Keep data safe, even as it moves outside the perimeter of the traditional network.
Tags : 
security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management, security policies
    
CDW
By: CDW     Published Date: Jul 08, 2015
A key to safeguarding data and apps is finding the right partner.
Tags : 
security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies, access control, security management, security policies
    
CDW
By: CDW     Published Date: Jul 08, 2015
Addressing vulnerabilities in this growing risk environment.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices, security management, security policies
    
CDW
By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, web services, web service security
    
Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, anti spam, anti spyware, application security, disaster recovery, firewalls, hacker detection, intrusion prevention, policy based management, security management
    
Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall, firewalls, internet security, intrusion prevention, policy based management, security management
    
Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco, compliance, firewalls, security management
    
Cisco
By: Cisco     Published Date: May 15, 2015
The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco, firewalls, security policies
    
Cisco
By: Cisco     Published Date: Jun 10, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of techniques.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, access control, anti spam, anti spyware, anti virus
    
Cisco
By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter