security infrastructure

Results 26 - 50 of 399Sort Results By: Published Date | Title | Company Name
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Published By: Aruba Networks     Published Date: Nov 15, 2013
With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user — employees, contractors, guests and even customers — appropriate to their role and type of device. Mobility in the workplace isn’t just for user benefit and productivity. The migration to mobility begets several IT benefits.
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le lieu de travail nouvelle génération repose sur la mobilité. À l’heure où le nombre d’appareils mobiles connectés à Internet dépasse la population mondiale, il est essentiel que les services informatiques soient en mesure d’offrir à chaque catégorie d’utilisateurs (employés, entrepreneurs, invités et clients) une connectivité fluide et adaptée à leurs besoins et types d’équipement. Outre les atouts évidents pour les utilisateurs et l’effet bénéfique sur la productivité, la migration vers la mobilité est source de nombreux avantages pour les services informatiques. Téléchargez ce livre blanc pour les découvrir…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Der Next-Generation Workplace steht für Mobilität. Im Jahr 2013 gab es mehr mit dem Internet verbundene Mobilgeräte als Menschen weltweit. Aufgabe der IT ist es, die dafür notwendigen Verbindungen und Netzwerke zu schaffen und dafür zu sorgen, dass diese an die Anforderungen der unterschiedlichen Benutzergruppen, an ihre Aufgaben sowie die eingesetzten mobilen Geräte angepasst sind – sei es für Angestellte, Unternehmer, Gäste oder Kunden. Mobiles Arbeiten steigert die Produktivität und bietet zahlreiche Vorteile für den Anwender – aber auch IT-Verantwortliche können profitieren. Laden Sie unser Whitepaper herunter und überzeugen Sie sich von den Vorteilen...
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
El lugar de trabajo de la próxima generación se centra totalmente en la movilidad. En este año 2013 hay más dispositivos móviles con conexión a Internet que personas en el planeta, de modo que la tecnología informática debe proporcionar una conectividad sin restricciones a cada tipo de usuario —trabajadores, contratistas, invitados e incluso clientes— apropiada para la función de cada uno y el tipo de dispositivo que utiliza. Se pone de manifiesto que la movilidad en el lugar de trabajo no es sólo para el beneficio propio del usuario y de la productividad. La migración hacia la movilidad genera varias ventajas en TI. Descárguese este documento técnico para descubrir las ventajas....
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Il luogo di lavoro di nuova generazione sarà tutto concentrato sulla mobilità. Già nel 2013 nel mondo ci sono più dispositivi mobili che persone, e l'IT deve fornire una connettività senza interruzioni ad ogni tipo di utente — dipendenti, appaltatori, ospiti e persino clienti — che si adatti al loro ruolo e al tipo di dispositivo che utilizzano. E così, la mobilità sul posto di lavoro non giova solo agli utenti e alla produttività. La migrazione verso la mobilità genera numerosi vantaggi informatici. Scaricate questo libro bianco per scoprirli tutti…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aventail     Published Date: Aug 21, 2009
Companies are embracing wireless technologies to increase productivity, provide more flexible work arrangements for their employees, and work more closely with their business partners. Read this white paper to learn how SSL VPNs deliver a means of protecting every node, whether internal or external to the enterprise.
Tags : 
ssl, vpn, network security, wireless networking, ssl vpn, wlan infrastructure, infrastructure, wireless infrastructure, aventail
    
Aventail
Published By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS
Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 15, 2018
"Cloud migration can be fraught with inevitable speed bumps. IT management must keep pace while infrastructures grow more complex, and security teams must safeguard their organization’s posture even as they relinquish control over some key technology—all while business teams must continue to predict and manage costs along the way. There are ways to navigate this process more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful, including: • How to make the transition to the cloud as seamless as possible • Why you need full visibility into your infrastructure before, during, and after migration • How IT, security, and operations teams can maximize the ROI from moving to the cloud"
Tags : 
    
AWS
Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
    
AWS - ROI DNA
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
Cloud migration can be fraught with inevitable speed bumps. IT management must keep pace while infrastructures grow more complex, and security teams must safeguard their organization’s posture even as they relinquish control over some key technology—all while business teams must continue to predict and manage costs along the way. There are ways to navigate this process more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful, including: • How to make the transition to the cloud as seamless as possible • Why you need full visibility into your infrastructure before, during, and after migration • How IT, security, and operations teams can maximize the ROI from moving to the cloud
Tags : 
    
AWS - ROI DNA
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack, ffiec, compliance, regulations, security challenges, regulatory compliance, cyber professional services, risk assessment, vulnerability, penetration testing, crimeware, phishing, critical infrastructure
    
BAE Systems
Published By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : 
voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure, uc solutions, mobility solutions, cloud solutions, enterprise business solutions, data center cloud service, it disaster recovery, network services, video collaboration
    
Black Box
Published By: Blue Coat Systems     Published Date: Aug 07, 2012
For anywhere, anytime, any-device mobile engagement, implementing a stateless architecture calls for building protection in the application layer, moving from device management to risk-based device inspection, performing real-time threat detection and mitigation, and leveraging cloud technologies.
Tags : 
mobility, it security, security & risk, s&r, infrastructure operations, i&o, devices, augmented reality, apps. cloud, virtualization, managed network, remote access, applications
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure
    
Blue Coat Systems
Published By: Blue Lane     Published Date: Jan 07, 2008
Quantros’ business—an ASP for the health care industry—requires a secure network and maximal uptime—all with a small IT department and a small budget. Quantros was challenged to implement and enforce sound security policies and to keep up with the continuous stream of vendor patches.
Tags : 
high availability, server, virtual server, network security, server vulnerability, vulnerability, vulnerabilities, quantros, vmware, infrastructure, blue lane, bluelane
    
Blue Lane
Published By: BMC ESM     Published Date: Aug 20, 2009
Automating your data center can improve operational efficiency and give you control over service quality, security, and business agility, while simultaneously reducing risk and costs.
Tags : 
data center, operational efficiency, service, security, business agility, automation, bmc, esm, virtualization, it infrastructure
    
BMC ESM
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: