HIT Consultant Insightful coverage of healthcare innovation
 

building security

Results 26 - 50 of 100Sort Results By: Published Date | Title | Company Name
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 25, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
cisco, power, radio, wi-fi, network, architecture
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Dec 11, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Cisco Systems     Published Date: Dec 23, 2013
Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now
Tags : 
cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks, mobile devices, network building
    
Cisco Systems
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Building on the popular Threat of the Month series, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: what do they reveal about future adversary tactics? With this lens, they chose threats that best embody what defenders should expect in the year ahead. The report contains in-depth analysis, best practices, and trends to watch.
Tags : 
    
Cisco Umbrella EMEA
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
In this January 2019 report from Forrester, you’ll learn how leading technology companies must engage their customers consistently while learning from their changing needs. To make this happen, IT leaders must offer technical platforms that enable agility and end-to-end integration. This report will show you: • Why tech leaders must embrace technology that engages and adapts with customers • The importance of building tech platforms that deliver speed and flexibility • How to automate and scale Zero Trust security throughout your environments
Tags : 
    
Citrix ShareFile
Published By: Coverity     Published Date: Mar 13, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle. And it is only by bringing security into all phases of development that you can begin to protect your operations.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Published By: Coverity     Published Date: Apr 20, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Published By: EMC Corporation     Published Date: Mar 20, 2014
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : 
emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : 
gfi, smbs, small, medium, business, it infrastructure, security, windows nt, exchange server, aup, acceptable use policy, remote access policy, secure, internet policy
    
GFI
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness are making the Security Delivery Platform a foundational building block to deploying security solutions. Read now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Download the Gigamon white paper, "Addressing the Threat Within: Rethinking Network Security Deployment," to learn how evolving cybersecurity threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how a security delivery platform can be the foundational building block for deploying adaptable security solutions. Read now.
Tags : 
    
Gigamon
Published By: Google Apigee     Published Date: Mar 06, 2019
Inside the API Product Mindset APIs expose data or functionality for use by applications and developers, which means they allow access to a business’s valuable digital assets—and thus to the heart of the business itself. Vulnerable APIs can expose a business’s core data and services to a variety of threats. Therefore, API security should be of paramount importance to any enterprise that exposes digital assets. Google Cloud’s new eBook, Building and Managing Secure APIs, takes a deeper look at the do’s and don’ts of enterprise API security. Explore how to design secure, easy-to-use APIs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use cases ? API monetization checklist
Tags : 
    
Google Apigee
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper ""Six Steps for Building a Robust Incident Response Function"" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q4'19
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : 
government it, modern technology, data security, risk reduction
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.