HIT Consultant Insightful coverage of healthcare innovation
 

sans

Results 51 - 75 of 169Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418
Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Blue Coat     Published Date: Nov 23, 2015
It’s time for Proactive Incident Response: *Full logs in the SIEM, plus complete collection of packet data *Packet data indexed, easily searchable and correlated with threat intelligence and other data. Working with multiple sources of security data, threats are detected early.
Tags : 
    
Blue Coat
Published By: Qualys     Published Date: Jun 02, 2015
Health care is often considered a lucrative business for those involved in waste, fraud and abuse. Today’s ever-accelerating technology changes make data related to health care, medical and financial issues even more attractive (and profitable) to cybercriminals who sell medical identities and siphon money from stolen financial records. Risks are exponentially increased because of organizations’ reliance on electronic systems for mission-critical functions. According to 61% of respondents to the SANS 2014 State of Cybersecurity in Health Care Organizations survey, medical/health record systems are considered the most at-risk information asset among the 224 health care-related organizations represented in the survey.
Tags : 
health care, state of cyber security, increase risks, improved practices, sans
    
Qualys
Published By: Qualys     Published Date: Jun 02, 2015
This paper discusses these challenges and how they are made more complicated by the rapidly accelerating pace of development and lack of control over applications hosted in the cloud.
Tags : 
application security, sans, developers and protectors gap, builders, defenders
    
Qualys
Published By: MessageLabs     Published Date: Sep 25, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The "pump 'n' dump" stock scam has been around a long time. Learn how Internet criminals are perfecting it, and how MessageLabs offers superior protection.
Tags : 
messagelabs, stock, spam, pump ‘n’ dump, fraud, dul blocklist protection
    
MessageLabs
Published By: Dell Storage     Published Date: Oct 17, 2011
With vStorage APIs, storage area network (SAN) resources can be utilized for greater virtual server performance and more efficient management of the entire virtualized data center. Read this white paper to find out more!
Tags : 
technology, vmware, dell, san, storage area, virtual server, desktop management
    
Dell Storage
Published By: Dell Storage     Published Date: Oct 17, 2011
The tight integration of DellT EqualLogic PS Series virtualized iSCSI SANs and VMware® vSphere virtualization software helps organizations enhance IT efficiency, expand virtualization throughout the IT infrastructure, and set the stage for cloud computing.
Tags : 
dell, technology, storage, infrastructure, data center, data management, cloud computing, virualization
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
The tight integration of DellT EqualLogic PS Series virtualized iSCSI SANs and VMware® vSphere virtualization software helps organizations enhance IT efficiency, expand virtualization throughout the IT infrastructure, and set the stage for cloud computing.
Tags : 
dell, technology, storage, infrastructure, data center, data management, cloud computing, virualization
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
With vStorage APIs, storage area network (SAN) resources can be utilized for greater virtual server performance and more efficient management of the entire virtualized data center. Read this white paper to find out more!
Tags : 
technology, vmware, dell, san, storage area, virtual server, desktop management
    
Dell Storage
Published By: McAfee     Published Date: Sep 04, 2014
SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.
Tags : 
siem, sans, endpoint, red, correlación, integración, seguridad
    
McAfee
Published By: McAfee     Published Date: Sep 04, 2014
El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.
Tags : 
siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Saiba como é possível evitar ataques de rede utilizando uma plataforma de SIEM que combina dados históricos com dados em tempo real de origens de rede e políticas de segurança para oferecer contexto sobre o uso de aplicativos, comportamentos dos usuários e outras operações com o objetivo de produzir relatórios otimizados e mais precisos.
Tags : 
siem, sans, terminal, endpoint, rede, correlação, integração, segurança
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
De acordo com o SANS Institute, a maioria das organizações está usando dados sobre eventos de segurança para detectar e monitorar comportamentos suspeitos, auxiliar em análises periciais, bem como cumprir os requisitos regulamentares e comprovar essa conformidade. Porém, fica difícil atingir essas metas de segurança com o número cada vez maior e a natureza sofisticada dos ataques. À medida que a disputa entre a segurança e os hackers continua, a McAfee conta com os recursos de que as empresas precisam para manter seus dados seguros e identificar ataques e vulnerabilidades. De acordo com o SANS, a força do McAfee ESM vem da sua facilidade de uso, da velocidade e da flexibilidade na definição de regras e correlações.
Tags : 
siem, armazenamento de dados, análise de eventos, ataques, análise pericial, segurança
    
McAfee
Published By: Infoblox     Published Date: Jun 18, 2015
This in-depth white paper from the SANS institute will bring you up to speed on today’s most dangerous vulnerability. In it, you will learn about: • How DNS works, and why, if unprotected, it can put your network at risk • The different kinds of DNS attacks—and who’s been hit by them • Major compliance frameworks that address the problem • Effective governance and best practices
Tags : 
infoblox, dns, attacks, effective governance, sans institute, compliance frameworks
    
Infoblox
Published By: ForgeRock     Published Date: Mar 10, 2015
L'identité est une composante essentielle de la croissance numérique. Les entreprises et les organisations ne peuvent tirer pleinement parti des technologies mobiles, du cloud ou de l'Internet des objets (IdO, ou IoT en anglais) sans une stratégie d'identités évolutive et reproductible. Sans une telle stratégie, elles ne disposent d'aucun moyen d'identifier leurs clients et d'interagir avec eux de quelque manière que ce soit, par le biais d'un ordinateur portable, d'un mobile, d'une tablette, d'une voiture connectée, d'un objet connecté à porter (« wearable »), d'un appareil domotique ou de la toute dernière innovation en termes de connectivité. Ce guide a été conçu pour vous aider à comprendre les éléments fondamentaux de l'identité client et la manière dont elle peut vous aider à communiquer avec vos clients.
Tags : 
    
ForgeRock
Published By: Anaplan     Published Date: Sep 07, 2018
Face à des consommateurs toujours plus puissants, imposant un rythme de plus en plus rapide et des désirs toujours plus changeants, le monde du Retail connaît une transformation profonde : baisse de trafic pour certaines enseignes, réduction des parcs magasins pour d’autres, développement de nouveaux services….sans parler des initiatives en « Omnicanal ». Ces investissements pèsent sur le compte de résultat des Retailers et mettent une forte pression sur les coûts et les marges. Dans ce contexte, l’équation pour?les professionnels du Merchandising et de la Supply Chain n’est pas simple. Ils doivent continuer à développer les meilleures pratiques de leur métier avec de nouveaux formats de vente, tout en intégrant les nouvelles exigences de l’Omnicanal, avec des consommateurs, tels que les Millennials, moins prévisibles que leurs ainés dans leur comportement d’achat. Pour les aider dans leur transformation et dans leur prise de décision et à travers 4 stratégies bien définies, ce Livr
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 26, 2018
Les entreprises modernes doivent évoluer à un rythme sans précédent. Certaines peuvent réagir rapidement, d’autres doivent lutter. D’où la question : pourquoi certaines entreprises réussissent, mais pas d’autres ? La Harvard Business Review a interrogé 385 lecteurs représentant des entreprises de plus de 500 employés à propos des défis rencontrés dans le domaine de la planification, ainsi que des outils qu’ils utilisent. Le verdict est sans appel : 9 sur 10 utilisent des tableurs, et seulement 22 % sont satisfaits du résultat. « La planification basée sur des feuilles de calcul en silos n’est plus adaptée à la rapidité d’évolution, ni à l’envergure du business d’aujourd’hui », conclut la Harvard Business Review. Heureusement, une solution existe ! Dans l’étude approfondie publiée par HBR sous le titre « The New Game Plan for Strategic Planning », vous lirez des entrevues avec des experts de l’industrie, et découvrirez une analyse des conclusions de l’enquête, des illustrations clair
Tags : 
    
Anaplan
Published By: Zscaler     Published Date: Jun 20, 2019
Les règles du jeu ont évolué : les applications migrent désormais vers le cloud, et les utilisateurs y accèdent de n’importe où, sans plus passer par le réseau de l’entreprise. Il est donc indispensable de repenser l’aspect sécurité de votre architecture. Découvrez avec ce livre blanc comment protéger vos actifs stratégiques avec les fonctionnalités Zscaler Data Protection et Cloud DLP.
Tags : 
    
Zscaler
Published By: Adobe     Published Date: Jul 15, 2019
Avec un nombre sans cesse croissant d’interactions client, notamment digitales, les entreprises cherchent rapidement à obtenir un avantage concurrentiel en utilisant des données et des informations à grande échelle pour créer et activer des profils à 360 degrés de leurs clients afin d’offrir une meilleure expérience. Pressées d’accélérer leur croissance digitale et d’améliorer leurs stratégies commerciales, de nombreuses entreprises mondiales ont mis en place des environnements technologiques cloisonnés et redondants, ce qui a donné lieu à des points de vue inexacts ou, pire encore, contradictoires sur les interactions de leurs clients avec leur marque. Par exemple, l’étude menée par Forrester révèle que 90 % des entreprises utilisent plusieurs outils d’analytics
Tags : 
    
Adobe
Published By: Workday France     Published Date: Feb 04, 2019
La technologie joue un rôle essentiel dans la gestion du capital humain pour les organisations qui s'intéressent à l'essor de l'entreprise sociétale. Elle offre la possibilité de gérer l'intégralité du cycle de vie du collaborateur, du recrutement à la fidélisation, et fournit les analyses nécessaires à la prise de décisions clés concernant l'entreprise. Découvrez les 4 étapes que doivent suivre les entreprises sans plus attendre.
Tags : 
technologie de la main-d'œuvre, stratégie digitale
    
Workday France
Published By: Dell EqualLogic     Published Date: Sep 15, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high-performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : 
dell equallogic, dell, equallogic, infrastructure, virtual, virtualization, virtual infrastructure
    
Dell EqualLogic
Published By: Tripwire     Published Date: Feb 08, 2013
John Gilligan, former CIO of the U.S. Air Force and the U.S. Department of Energy, led the development of this document; it represents a consensus of government and nongovernment experts.
Tags : 
cyberdefender, security, federal, government, sans 20 sc, dhs, defense
    
Tripwire
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.