app protection

Results 51 - 75 of 352Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
While the choices facing you may seem daunting, the truth is that there’s never been a better time to shop for a web application firewall. WAF technology is now more accessible, affordable, and manageable than ever before—which is a good thing, because companies need the protection a WAF offers now more than ever. For more information about choosing the WAF that’s right for you, visit f5.com/security.
Tags : 
waf, companies, management, technology
    
F5 Networks Inc
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA
Published By: Cohesity     Published Date: Mar 19, 2019
The City of Santa Barbara, California is located just 90 miles northwest of Los Angeles is the county seat of Santa Barbara County with a population of just over 90,000. Often referred to as the ‘American Riviera’, Santa Barbara is located between the Pacific Ocean and the Santa Ynez Mountains. Santa Barbara functions similar to a big city because it manages its own police and fire departments, city waterfront, and airport, managing an annual operating budget of just over $350M with approximately 1600 employees. The IT team supports all technology functions and operations for the City, including data backup and protection.
Tags : 
    
Cohesity
Published By: Zscaler     Published Date: Jun 20, 2019
Les règles du jeu ont évolué : les applications migrent désormais vers le cloud, et les utilisateurs y accèdent de n’importe où, sans plus passer par le réseau de l’entreprise. Il est donc indispensable de repenser l’aspect sécurité de votre architecture. Découvrez avec ce livre blanc comment protéger vos actifs stratégiques avec les fonctionnalités Zscaler Data Protection et Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
    
Zscaler
Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
IBM
Published By: Dell     Published Date: Nov 02, 2018
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Kaminario     Published Date: May 05, 2016
This IDC Buyer Case Study reviews how Cobb EMC, a regional not-for-profit electric utility company serving the greater Atlanta metropolitan area, addressed evolving IT infrastructure requirements with flash storage technology to improve performance and substantially improve IT efficiencies. This Buyer Case Study explores what drove Cobb EMC's initial interest in flash, how flash deployment has evolved in the company's environments, how the deployment has impacted its business, and what future plans exist for AFAs at Cobb EMC.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
Kaminario
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Commvault     Published Date: Jul 06, 2016
Two leaders in data protection software and hardware have partnered to bring you a solution that closes the scalability, flexibility and manageability gaps in current oofferings.
Tags : 
commvault, backup appliances, netapp, data protection, data protection software, turnkey solution, scalability
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
    
Commvault
Published By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365
    
Intel Security
Published By: HP VMware     Published Date: Mar 03, 2008
There are probably as many approaches to data protection and disaster recovery as there are types of disasters that might befall your datacenter. Figuring out which approach is best for your datacenter—from a technical, operational and financial outlook—is enough to keep a responsible manager like you up at night. Download this paper to learn about the proven, flexible solution that prepares your data to survive and recover from almost any calamity, from HP and VMware.
Tags : 
vmware, disaster recovery, sim, data protection, cdp, esx server, bladesystem, data replication
    
HP VMware
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: HPE     Published Date: Feb 11, 2015
Protecting your business-critical applications without impacting performance is proving ever more challenging in the face of unrelenting data growth, stringent recovery service level agreements (SLAs) and increasingly virtualized environments. Traditional approaches to data protection are unable to cost-effectively deliver the end-to-end availability and protection that your applications and hypervisors demand. A faster, easier, more efficient, and reliable way to protect data is needed.
Tags : 
    
HPE
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The world set a new record for data breaches in 2016, with more than 4.2 billion exposed records, shattering the former record of 1.1 billion in 2013. But if 2016 was bad, 2017 is shaping up to be even worse. In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk. Out of all these stolen records, a large majority include usernames and passwords, which are leveraged in 81 percent of hacking-related breaches according to the 2017 Verizon Data Breach Investigations Report. Faced with ever-growing concerns over application and data integrity, organizations must prioritize identity protection in their security strategies. In fact, safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in 2017.
Tags : 
data breach, credential stuffing, system security, security
    
F5 Networks Inc
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.