• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

net iq

Results 1 - 25 of 215Sort Results By: Published Date | Title | Company Name
By: Menlo Security     Published Date: Nov 11, 2019
"Digital Transformation Is Changing How Enterprises Provide Secure Web Access to Users. According to Gartner, “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services, and data located outside of an enterprise than inside.” A New Approach to Enterprise Security in the Cloud Is Needed. Gartner recommends, “Complexity, latency and the need to decrypt and inspect encrypted traffic once will increase demand for consolidation of networking and security-as-a-service capabilities into a cloud-delivered secure access service edge (SASE, pronounced “sassy”).” This new approach requires an Internet isolation solution that: - Provides 100 percent malware-free email and web browsing - Preserves the native email and web browsing experience - Gives users ubiquitous yet secure access wherever they work Menlo already offers the solution that delivers on Gartner’s vision of network security in the cloud. Find out more by downloading t
Tags : 
    
Menlo Security
By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Do you have a plan for turning 5G excitement into revenue? Will your 4G pricing strategies still work, or will the market switch to speed tiers, hyper-segmented offers and other new monetization techniques. Download our latest eBook to learn about: The most promising Consumer, Enterprise and IoT use cases The Customer Proposition for each use case How Service Providers can turn new opportunity into revenue
Tags : 
    
Matrixx Software - Kingpin
By: Cisco and NVIDIA Corporation     Published Date: Oct 25, 2019
La combinaison de Citrix Networking et de Google Cloud aide le service informatique à relever plusieurs défis pour la fourniture et la gestion des applications. Voici comment: Gérer un cloud hybride Déplacer les charges de travail sur site et héritées Fournir une mise en réseau native sur le cloud pour les microservices et les applications de conteneur Améliorer les performances pour l'accès à distance aux ressources du cloud Fournir un accès utilisateur intégré
Tags : 
    
Cisco and NVIDIA Corporation
By: BlackBerry Cylance     Published Date: Sep 18, 2019
When Daniel Shuler joined Phoenix Children’s Hospital (PCH) as CISO in 2016, he knew the hospital would be a tempting target for cyber criminals due to the massive troves of sensitive data it collects to diagnose and treat patients. Over the next three years, Shuler spearheaded a complete overhaul of PCH’s security fabric. First, he decommissioned the legacy AV and engaged BlackBerry Cylance’s ThreatZERO™ consultants to deploy CylancePROTECT® on over 4,000 endpoints. Soon after, CylancePROTECT stopped a ransomware attack that could have disrupted patient care by preventing access to electronic medical record data. Next, he engaged a BlackBerry Cylance Red Team to perform annual penetration testing assignments. Says Shuler, “Our relationship is unique in my experience. BlackBerry Cylance has proven repeatedly that they have our best interests at heart and that they share our commitment to provide the best care possible for children and their families.” Read the case study for the full s
Tags : 
    
BlackBerry Cylance
By: Outreach.io     Published Date: Sep 17, 2019
LinkedIn is the largest social networking platform for business professionals, but utilizing it effectively to build your brand and move the needle for you business is a delicate balance. Many leaders struggle with finding the right balance of building an authentic brand. To help you begin building your brand, establish your voice, and drive business and opportunity for yourself and your team, this guide will answer the following questions about effectively using LinkedIn: Does building my brand help me close deals? How can the platform move the needle for my pipeline? What is proper etiquette when communicating with peers? How do I enable my sales team to incorporate LinkedIn into the outbound efforts? Download today to establish your presence on LinkedIn!
Tags : 
    
Outreach.io
By: Shape Security     Published Date: Sep 12, 2019
Online credentials have been stolen and compromised for almost as long as the Internet has existed. But in the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. Theft of user credentials has ramped up significantly for a number of reasons including: Users are reusing the same usernames and passwords across multiple sites Automated tools can take stolen credentials and test them on other sites at a massive scale Many customers have high value assets that are extremely lucrative targets for cyberattacks In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Tags : 
    
Shape Security
By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
    
Akamai Technologies
By: FICO EMEA     Published Date: Aug 28, 2019
Synthetic Identity Fraud is growing in both scope and complexity. As your fraud protection efforts succeed in some areas of your business, fraudsters are devising new ways to penetrate your defenses. Do you understand the concepts of Bust Out Fraud, Data Furnishing, and Piggybacking? These are just some of the new techniques that fraudsters are using to exploit the holes in your fraud defenses. Download the eBook "Synthetic Identities: Are You Chasing Invisible Footprints?" This insightful eBook illustrates the aggressive techniques that fraudsters are using and answers questions such as: What are the six major factors driving the growth in Synthetic Identity Fraud? How are synthetic identities used? What are Bust Out Fraud, Data Furnishing, and Piggybacking, and how do they work? Perhaps more importantly, what are the state-of-the-art strategies used to fight these increasingly sophisticated fraud techniques?
Tags : 
synthetic identity fraud, manage fraud
    
FICO EMEA
By: Limelight Network     Published Date: Aug 12, 2019
To provide the best possible streaming video experience that will increase revenue and customer satisfaction, many organizations engage the services of a Content Delivery Network (CDN). However, to choose the right CDN for your video workflow and business requirements, you must first evaluate your unique needs. The following provides guidance for identifying the key considerations and questions to ask.
Tags : 
    
Limelight Network
By: Limelight Network     Published Date: Aug 12, 2019
To provide the best possible customer experiences that will increase revenue and customer satisfaction, many organizations engage the services of a Content Delivery Network (CDN). However, to choose the right CDN for your workflow and business requirements, you must first evaluate your unique needs. The following provides guidance for identifying the key considerations and questions to ask.
Tags : 
    
Limelight Network
By: Google     Published Date: Aug 05, 2019
Moving existing enterprise workloads to the cloud has always been challenging as companies struggle to adapt and migrate applications to run in a cloud environment. IT managers must understand application dependencies, change drivers and networking configurations, and learn new management interfaces. This white paper will provide a deeper understanding of Migrate for Compute Engine's technology for mass migrations into GCP unique technology and architecture, and will explore how these capabilities improve current mass migration practices.
Tags : 
cloud applications, cloud as a service, velostrata, migration, google cloud
    
Google
By: Iovation     Published Date: Aug 02, 2019
You may have heard that storing device data for more than a few months has no value because fraudsters frequently switch devices. Our data shows otherwise. Over a typical 30-day period, iovation saw 2M transactions from devices with a history of fraud that was first seen on our network 3+ years earlier. That number is even more sobering for devices first seen 1-2 years earlier: 16M transactions. Fortunately, iovation’s unique device history capability provides our customers with the knowledge of whether a device has a history of fraud.
Tags : 
    
Iovation
By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to analyze and action data using artificial intelligence (AI). Financial services companies can greatly benefit from this leap forward in technology that enables unique insights into all aspects of the industry. With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists now have the ability to tackle complex problems and find credible and profitable solutions.
Tags : 
    
Pure Storage
By: Darktrace     Published Date: Jun 21, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
By: Zscaler     Published Date: Jun 19, 2019
You can’t impose controls on something you don’t own. And in today’s cloud- and mobile-oriented enterprise, no one truly owns the network. The Internet has become the one network that every corporate worker uses and that no corporate IT can control. The emergence of cloud, ubiquitous networks, smartphones and smart (or dumb) networked devices are wreaking havoc over the traditional command-and-control IT mode of operation. This shift is different from anything we’ve experienced before, because nobody owns the network.
Tags : 
    
Zscaler
By: Darktrace     Published Date: Jun 17, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
By: Schneider Electric     Published Date: Jun 03, 2019
Industrial Internet of Things (IIoT) technologies and concepts can transform and enhance process safety practices if appropriately applied. Download the white paper for guidance on leveraging IIoT tools and techniques to deliver industrial safety in a profitable manner.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Every good story needs a villain — and the world of network security has plenty of them. We’ve got a fun new diversion for you for when you need a break from fighting the bad guys. Test your malware IQ (and your knowledge of fairy tales) by taking our quiz, Malware or Maleficent?
Tags : 
    
Cisco Umbrella EMEA
By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
By: Sierra Wireless     Published Date: May 08, 2019
With Octave TM, Sierra Wireless went a step further and takes care of the secure device to cloud infrastructure OEM need, so that washing machine manufacturers can focus on what really matters for their business: acting on their equipment data to create new services. Octave is an all-in-one D2C platform optimized for cellular IoT, including intelligent edge, wireless network connectivity, and unique data orchestration and device management capabilities. To find out more download today!
Tags : 
    
Sierra Wireless
By: Darktrace     Published Date: Apr 02, 2019
As organizations increasingly rely on cloud services and SaaS applications to streamline business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migrations continue apace, the unique security challenges presented by the cloud will not only require a more agile mindset, but also self-learning technologies that can move at the speed of cloud deployments and spot subtle deviations indicative of a threat, while providing complete, real-time visibility across the digital business. Darktrace’s world leadership in the field of artificial intelligence for cyber security makes it the most effective and proven solution to detect unprecedented threats and anomalous cyber-incidents in the cloud. Whether faced with an insider threat, an attacker targeting sensitive data in test containers, or a significant misconfiguration that could be exploited in the fut
Tags : 
    
Darktrace
By: Apstra     Published Date: Feb 21, 2019
Modern data centers based on hyperscale, leaf-spine switching architectures are growing so large and complex they are outstripping the capacity of operators to engineer, configure and manage these networks using traditional tools and techniques. As a result, data center operators are looking for new ways to automate workflows, maximize uptime and increase operational agility while reducing operating costs
Tags : 
acg, data center efficiency
    
Apstra
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter