HIT Consultant Insightful coverage of healthcare innovation
 

bot security

Results 201 - 225 of 239Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
    
VMware
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot
    
Arbor Networks
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention
    
Damballa
Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls
    
Symantec
Published By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : 
centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security, saas, saas security
    
Centrify
Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping
    
distilnetworks
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. This is where VMware Workspace™ ONE™ comes in — we’ve brought together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware AirWatch
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web
    
Citrix Systems, Inc.
Published By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.
Tags : 
ssl, http, firesheep, side-jacking, wi-fi attacks, tls, user protection
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : 
cloud security, crownpeak, security market, competitive dynamics
    
Crownpeak
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic, riskwatch
    
RiskWatch
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : 
mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
    
HP - Enterprise
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks
    
IBM
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft
    
Globalscape
Published By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.