threats

Results 1 - 25 of 1380Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But todayís environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether itís speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Donít let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesnít have to be complicated. Thereís one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovoís end-to-end protection, built-in to devices. And itís giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Donít lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, youíll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. Itís time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
Find out why itís harder than ever to keep data secure, as well as what could be causing security breaches. Plus see how to mitigate this risk using end-to-end solutions in this infographic. Learn how Lenovoís ThinkShield solutions, combine cutting-edge security solutions to protect your devices from cyber-attack, throughout their lifecycle. Making all the difference with true, end-to-end protection at the device, identity, online and data levels.
Tags : 
    
Lenovo - APAC
Published By: MeQuilibrium     Published Date: Jul 31, 2019
More people suffer from anxiety than ever before, and itís deeply affecting companies like yours. Many organizations are stuck wondering what to do. In this white paper, ďThe Triple A Threat,Ē we explore the Triple A Threat of anxiety, anger, and aggression. Weíll explain what impact these issues have on your workplace and your bottom line. Youíll also learn: ? The debilitating impacts of anxiety, which can lead to workplace anger and aggression ? Why resilient employees suffer less anxiety and can rebound after a setback ? How to build a habituated, protective shield through proven prevention techniques Resilience can equip your people with the skills to address stress and the challenges that work presents every day. With more resilient employees, organizations can dramatically reduce the threats of anxiety, anger, and aggression. Download Now
Tags : 
    
MeQuilibrium
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how itís evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. Itís challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyerís Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: ē Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities ē Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded ē Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
    
VMware
Published By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organizationís progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victimsí networks. Download the Cyber Intrusion Casebook to learn: ē The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments ē Key takeaways ó based on the CrowdStrike Services teamís extensive experience
Tags : 
    
CrowdStrike
Published By: SAP     Published Date: Feb 03, 2017
Companies across the globe are all facing the same economic headwinds: business change in the form of competitive threats and new opportunities is coming at an unprecedented pace. The watchword for meeting these challenges is innovation Ė both in terms of business processes as well as the underlying technology that enables those processes. The sum of the experiences discussed in this report showcase how SAP S/4HANA, running on-premise or in the cloud, can form the basis for a broad-based business transformation that does not require a big bang implementation to succeed.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
    
SAP
Published By: Cisco EMEA     Published Date: Jun 19, 2019
When it comes to the threat landscape, itís important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at whatís behind you, but you can often spot whatís coming up quick, set to overtake you. Weíve picked out five key stories because we think these threats, or similar ones, could appear again. To find out what these are download this whitepaper today!
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 19, 2019
When it comes to the threat landscape, itís important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at whatís behind you, but you can often spot whatís coming up quick, set to overtake you. Weíve picked out five key stories because we think these threats, or similar ones, could appear again. To find out what these are download this whitepaper today!
Tags : 
    
Cisco EMEA
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their companyís security posture against their peersí.
Tags : 
    
HPE APAC
Published By: Cisco     Published Date: May 24, 2019
Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smart. Here are 5 tips to keep in mind when choosing a Next Generation Firewall for your business.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : 
service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search