app protection

Results 251 - 275 of 352Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection
    
Lumension
Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention
    
IBM MaaS360
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security
    
Cisco
Published By: Juniper Networks     Published Date: Sep 10, 2014
Concerned about attacks on web-facing applications? Download the Whitepaper to understand the limitations of next-generation firewalls and learn about three technologies that protect web applications and data centers.
Tags : 
next generation firewalls, application attacks, web-facing applications, firewall limitations, protection technology
    
Juniper Networks
Published By: HP     Published Date: Aug 08, 2014
In any storage system it is essential to ensure that the integrity of the data stored is maintained so data can be recovered exactly as it was written. HP StoreOnce appliances have been designed with the necessary technology that delivers this essential high degree of data protection. HP has unique technology that protects data throughout its lifecycle when stored on the HP StoreOnce appliance. This paper will discuss the methods used at various stages to provide this high degree of data integrity.
Tags : 
storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
    
HP
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: HP     Published Date: May 14, 2014
In today’s world of explosive data volumes, midmarket companies face a growing number of challenges when it comes to safeguarding data, and today's approaches to backup and data protection are falling short. The Brief outlines HP solutions to meet IT needs for backup appliances that tightly integrate deduplication, data protection and recovery.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication
    
HP
Published By: HP     Published Date: May 14, 2014
As a long-time leader in data protection and backup solutions, and with innovations such as HP StoreOnce deduplication, HP TapeAssure and HP StoreOpen with LTFS, HP understands your immediate requirements and strategic business direction. With an integrated approach to comprehensive business protection, we can help you safeguard the integrity of your data and rapidly restore access whenever, wherever, and however you need it.
Tags : 
hewlett packard, data protection, storeonce, tapeassure, ltfs
    
HP
Published By: Dell Software     Published Date: May 07, 2014
Short: Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. Try it today.
Tags : 
storage, advanced data protection, backup, replication, security, recovery, software solution, trial download
    
Dell Software
Published By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
Symantec
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
McAfee
Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
Rapid7
Published By: Symantec     Published Date: Mar 06, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture.
Tags : 
symantec, data protection, backup appliances, backup applications, data protection architecture, virtual enviornments
    
Symantec
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this environment, mobile app reputation services will be a key tool to retain credibility to increase competitiveness.
Tags : 
mobile app, credibility, reputation service, secure cloud service, endpoint, device protection
    
Webroot Inc
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your employees using WhatsApp? Is mobile messaging taking over an ever-growing portion of your enterprise communications? Is your enterprise running into compliance considerations around messaging? Learn about approaches to addressing these challenges so that your employees can communicate on the go and your enterprise data will be protected.
Tags : 
whatsapp, enterprise communication, employees, enterprise data protection, enterprise data, mobile protection, mobile messaging
    
Nativeflow
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
Nativeflow
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications
    
Kaspersky Lab
Published By: Lumension     Published Date: Feb 07, 2014
Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.
Tags : 
lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Webroot UK     Published Date: Dec 20, 2013
The Webroot® Intelligence Network (WIN) is a key component of a revolutionary approach to next-generation malware protection. Together, WIN and Webroot is combined with Webroot’s ultra-efficient endpoint agent — Webroot® SecureAnywhere™ Business - Endpoint Protection ensure that both known and... that both known and unknown infections are removed before they do harm.
Tags : 
webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security
    
Webroot UK
Published By: NetApp     Published Date: Dec 12, 2013
IT managers have indicated their two most significant challenges associated with managing unstructured data at multiple locations were keeping pace with data growth and improving data protection. Learn how the NetApp Distributed Content Repository provides advanced data protection and system recovery capabilities that can enable multiple data centers and remote offices to maintain access to data through hardware and software faults.
Tags : 
netapp, lab validation, distibuted content repositor, big content scalability, enterprise reliability, intelligent object management
    
NetApp
Published By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : 
imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls
    
Imperva
Published By: Qualys     Published Date: Nov 05, 2013
Web applications have recently emerged as a top cybercriminal attack vector, and organizations that don’t take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still don’t have an application security program in place – what can you do to make sure you’re protected? Consult this informative survey today to discover your peers’ proven practices for app security success, and learn what you can do to stay protected – read on to get started.
Tags : 
qualys, sans, sans survery, application, application security, web applications, web applications security, cybercriminals
    
Qualys
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
F5 Networks Inc
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.
Tags : 
sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment, it environment, recovery time objective, rto
    
SunGard Availability Services
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.