data network

Results 151 - 175 of 992Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Juniper’s expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Interactive Data is a trusted leader in financial information, delivering a comprehensive set of products and services designed to meet the needs of the front, middle, and back offices at some of the largest and most well-known institutions around the world. These clients trust Interactive Data to help support their investment activities and operational workflow through a broad range of offerings.
Tags : 
interactive data, financial services, global network, market data, ethernet switches, low latency, it infrastructure
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Suddenly, the network is cool again. Tech trends such as the Internet of Things, software-defined networking and growing end-user expectations all add up to a demand for “dialtone” network performance and reliability. But as the data deluge continues to accelerate, and as organizations continue to rely on multiple clouds to achieve business goals, how can the network keep up, much less meet tomorrow’s demands? This e-book looks at the trends that are impacting the enterprise network—the modern network—the issues it creates for NetOps professionals, and how organizations can act today to plan for tomorrow.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: VMware     Published Date: Dec 10, 2018
As agencies continue to modernize data center infrastructure to meet evolving mission needs and technologies, they are turning to agile software and cloud solutions. One such solution is hyper-converged infrastructure (HCI), a melding of virtual compute, storage, and networking capabilities supported by commodity hardware. With data and applications growing exponentially along with the need for more storage capacity and flexibility, HCI helps offset the rising demands placed on government IT infrastructure. HCI also provides a foundation for hybrid cloud, helping agencies permanently move applications and workloads into public cloud and away from the data center.
Tags : 
    
VMware
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Riverbed     Published Date: May 24, 2012
Data transfer bottlenecks and unpredictability on the Wide Area Network (WAN) can hurt application performance. In addition, the time required to migrate large volumes of data to and from data centers can be a serious concern to business continuity.
Tags : 
wan, wan optimization, riverbed, virtual steelhead, business technology, data center
    
Riverbed
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure, data center
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
Read this white paper to learn about the potential networking ramifications of various cloud deployment models and learn how to meet these challenges head on.
Tags : 
cloud computing, data center, network performance, network ramifications, applications
    
IBM
Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, business technology, research
    
Qualys
Published By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&S®PACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.