emerging threats

Results 26 - 50 of 50Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
McAfee
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
Introduces Trend's Threat Research Group and provides a look at tomorrow's threats and security challenges that cover the Spectrum of Computing including mobility from the perspective of an industry leader.
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
    
Trend Micro Inc.
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Citrix Systems     Published Date: Nov 13, 2018
Apps are constantly changing — and they quickly spread across your network. You need an ADC that can support hybrid cloud and application delivery in new ways with new technologies to create opportunities for innovation as your enterprise strives toward digital transformation. How do you create a strategy for your networking and app delivery strategy? This eBook identifies ADC key considerations for: -Hybrid Cloud -New generation application architecture -Emerging security threats -Infrastructure and app interdependence
Tags : 
    
Citrix Systems
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
    
McAfee
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: IBM     Published Date: Jan 07, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, networks, threats, protection, security
    
IBM
Published By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : 
ibm, middleware, solutions, digital, security, cyber threats
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, network protection, ibm security network protection, network security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats, network
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
F5 Networks Inc
Published By: SAS     Published Date: Nov 16, 2018
Instances of fraud have become commonplace in many industries, and it’s costing organizations millions of dollars annually and placing corporate brands at risk. But despite significant investments in staff and anti-fraud software, new and emerging fraud threats keep slipping through undetected. Why? Because it’s too costly to keep anti-fraud software current. Paying a vendor to make software changes dramatically increases total cost of ownership. This paper discusses how SAS addresses this challenge with next-generation fraud solutions like SAS Visual Investigator, a cloud-ready investigation and incident management platform that end users can easily configure and adapt to detect new and evolving types of fraud.
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic
    
Cisco
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot
    
Arbor Networks
Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions
Published By: Symantec     Published Date: Oct 01, 2015
Stay up-to-date with Symantec's WSTR 2015: your 3-Part report to the world's current and emerging website security threats. Packed with valuable insights and statistics, it's all you need to know about the threats that impact your online business world.
Tags : 
web security, web threats, online business, e-commerce
    
Symantec
Published By: Schneider Electric     Published Date: Jun 07, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which ,can have both a positive and negative impact on their businesses.
Tags : 
decision-making, emerging threats, schneider electric, - colocation data center threats, colocation provider
    
Schneider Electric
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era In this eBook, you’ll learn how adopting the right ADC equips you to embrace change—from deploying the latest microservice apps to guarding against emerging security threats. To guide you toward the right ADC for your needs, this eBook will show you: • Digital transformation’s impact on the ADC landscape • Why your ADC should be software-based for better flexibility • How a modern ADC protects against security threats
Tags : 
    
Citrix ShareFile
Published By: Sage Software     Published Date: Oct 23, 2018
Innovative ways to take your business efficiency and collaboration to the next level. Across every industry, C-level executives are focusing on innovation and technology to improve the efficiency and performance of their businesses. Now more than ever they need to develop strategies that make their organizations relevant, memorable and competitive in an era where digital business transformation is not just a goal, it’s a continuous, speeding journey. • Take advantage of new opportunities • React to emerging threats and take advantage of new markets • Cope with disruptive forces
Tags : 
bms, enterprise accounting, enterprise intelligence
    
Sage Software
Previous    1 2     Next   
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.