web

Results 1 - 25 of 4214Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
Published By: Nutanix     Published Date: Aug 22, 2019
Nutanix created hyperconverged infrastructure years ago because there was an urgent need for innovation within enterprise infrastructure. IT silos, management complexity, and gross inefficiencies were undermining the customer experience. It was time for a paradigm shift, which is why Nutanix melded webscale engineering with consumer-grade design to fundamentally transform the way organizations consume and leverage technology.
Tags : 
    
Nutanix
Published By: Nutanix     Published Date: Aug 22, 2019
Organizations can now fully automate hybrid cloud architecture deployments, scaling both multitiered and distributed applications across different cloud environments, including Amazon Web Services (AWS) and Google Cloud Platform (GCP). Ready to learn more about hyperconverged infrastructure and the Nutanix Enterprise Cloud? Contact us at info@nutanix.com, follow us on Twitter @nutanix, or send us a request at www.nutanix.com/demo to set up your own customized briefing and demonstration to see how validated and certified solutions from Nutanix can help your organization make the most of its enterprise applications.
Tags : 
    
Nutanix
Published By: Amazon Web Services EMEA     Published Date: Jul 31, 2019
Rapid change is underway in the world of digital government. This is not only being driven by huge advances in technology, but also a global community unified by new thinking, bold ideas, and cost-effective, scalable solutions.
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Cisco has been named in the first ever Gartner ‘Voice of the Customer’ report for the Secure Web Gateways (SWG) market for Cisco Umbrella. Gartner Peer Insights is a peer review and ratings platform designed for enterprise software and services decision makers. This document synthesizes Gartner Peer Insights’ content in the SWG market for 2018. Gartner states that ""this peer perspective along with the individual detailed reviews, is complementary to expert research and should play a key role in the customer buying process."" This report includes: - SWG Peer Reviews and Ratings - Vendor comparisons - Reviewer demographic"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
We have covered a great risk in the web attack vector of ransomware, and greatly improved our user experience in regards to Internet connectivity. -Jason Hancock, Global Senior Network Engineer, Octapharma
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We liked that Umbrella’s intelligent proxy would give us granular protection without the performance impact of a traditional web proxy.” - Torben Olsen, Corporate Information Security Manager, Lundbeck
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go beyond the hype.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
    
Cisco Umbrella EMEA
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Group M_IBM Q3'19     Published Date: Jul 19, 2019
Hear the highlights from industry leaders presented their experience in digital transformation at Reinventing Financial Services 2019. Hearing from executives leading IT, operations, and lines of business from companies such as USAA, Bank of America, HSBC, Prudential, and many others in this session, we’ll cover the strategies and tactics for building the platforms necessary for reinventing customer experience, empowering employees and creating te
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 13, 2019
Beneath the Surface of Digital Transformation: Why Leaders Modernize Enterprise Applications 
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 28, 2019
Webinar: Utilities are facing incredible challenges today driven by flattening demand, aging infrastructure, knowledge gaps, and challenging customer satisfaction requirements.  Watch this webinar to learn how IBM Maximo for Energy & Utilities can help.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Which of your applications should move to the cloud? Is public, private, or hybrid cloud the right choice? And should you use containers, or Platform-as-a-Service technologies? Whether you’re trying to optimize your existing landscape, strengthen your foundation, or innovate with newer technologies that are delivered via cloud platforms, you need to know where to start. In this webcast, hear how IBM helped The Tribune Publishing Company build an effective plan to accelerate their digital transformation. Learn how IBM can also help you analyze your full portfolio, identify opportunities to optimize and automate your infrastructure and determine which applications to move, and the potential business value.
Tags : 
    
Group M_IBM Q3'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Flexential     Published Date: Jul 17, 2019
By 2020, there will be 50 billion devices producing 600Zb of data, driving enterprises to assess their IT infrastructures to keep pace with unprecedented data processing demands. Is your business ready to handle this data explosion? In this on-demand webinar, you’ll hear Tim Parker, Vice President of Network Services at Flexential, and Craig Matsumoto, Senior Analyst of Data Center Services at 451 Research, discuss the evolution of data – and how enterprises are processing and creating it. Download now to hear Parker and Matsumoto examine how edge computing solutions are meeting the latency demands of an increasingly digitized world.
Tags : 
    
Flexential
Published By: Flexential     Published Date: Jul 17, 2019
This webinar recording led by Flexential V.P. of Network Services Tim Parker and 451 Research Senior. V.P. of Research Kelly Morgan examines how companies are using edge facilities to control and manage content. Parker and Morgan present strategies for solving latency and security concerns, along with use cases from companies using facilities at “the edge” to get the most from their data – without breaking the bank.
Tags : 
    
Flexential
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search