managed security

Results 1 - 25 of 166Sort Results By: Published Date | Title | Company Name
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Alert Logic     Published Date: Jun 12, 2014
The numbers show a clear trend: there is a growing consensus among CISOs that outsourcing security services is a viable option. In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Tags : 
mssp, security services, cloud security, managed security, secure cloud
    
Alert Logic
Published By: AlienVault     Published Date: Oct 20, 2017
When you're starting service with a customer, setting the tone early on is very important. That's why we've created a checklist to help you stay organized from the start and implement smart process around your Managed Security Service Provider (MSSP) service. Feel free to use it but most importantly modify it. Use this checklist to help you document: • Network information • Logging devices • Contact information • Priority escalation contacts • Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase chances of success. Success is due to people, processes, and tech in equal proportions. Generally, new MSSPs should pick a core set of competencies and branch outward from there. In this white paper, Garrett Gross, Director of Field Enablement, AlienVault and Tim Foley, Sr. Manager of Information Security, Dataprise discuss the current state of the market for MSSPs and best practices for new MSSPs.
Tags : 
    
AlienVault
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report
    
Arbor Networks
Published By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : 
download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, filexpress managed file transfer
    
Attachmate
Published By: Attachmate     Published Date: Jul 09, 2013
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms, protocols, and security standards? Can it successfully deliver large files, to the right person, on time? If uncertainty is part of your daily routine, you need to see this video.
Tags : 
download ftp program, secure ftp, secure large file transfer, managed file transfer, ftp automation, managed ftp reflection ftp client, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation
    
Attachmate
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation
    
Attachmate
Published By: AWS     Published Date: Aug 06, 2019
Old-guard database providers are expensive, proprietary, have high lock-in costs, and impose restrictive licensing terms. The challenge to date has been to achieve the same performance and availability of commercial-grade databases on open source databases such as MySQL, PostgreSQL, and MariaDB. Examine key considerations that go into any database migration decision and specific use cases—in Financial Services and Healthcare Analytics implementations—where Datavail carefully managed database migrations from traditional database providers to the cloud—and in particular Amazon Aurora. Download the eBook to learn about: Migration considerations and strategies including lift and shift, re-platforming, and re-factoring Security and compliance functionality enabled by Amazon Aurora Performance and scalability opportunities enabled by AWS
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Managed print services have been proven to drive cost savings as much as 10-30 percent over traditional approaches as well as increase efficiency, security and sustainability across your business.
Tags : 
print management, business process outsourcing, business performance management, managed print services, business imaging, document and print management, business management
    
Canon Business Process Services
Published By: Castelle     Published Date: Nov 01, 2006
Castelle’s integration provides seamless fax integration with native Notes services like logging and reporting, and lets faxes be managed just like other Notes email, with all of Domino’s native security, administration, and customization capabilities.
Tags : 
ip networks, ip telephony, network management, servers, small business networks, tcp/ip protocol, contact management, messaging, call center management, ip faxing, it spending, return on investment, email, castelle
    
Castelle
Published By: CEB     Published Date: Dec 05, 2013
Improve confidence in your technology plans and break through the vendor hype with this real-world look at technologies actually being deployed by Infrastructure functions across the globe.
Tags : 
emerging technologies, managed cloud services, cloud based architectures, security technologies, industry trends, technology adoption, technology investment plan
    
CEB
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit, web security, cenzic
    
Cenzic
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, particularly Graham, Leach, Bliley (GLBA), the Payment Card Industry Data Security Standards (PCI-DSS) and the Sarbanes Oxley Act (SOX). Today, the General Data Protection Regulation (GDPR) is also top-of-mind, as it regulates not only the processing of personal data, including PII, relating to individuals in the European Union, for also any organization that processes personal data of EU residents. For United States banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer prot
Tags : 
    
CheckMarx
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.