security applications

Results 101 - 125 of 424Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Dec 13, 2018
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention, security management, vulnerability management, data loss prevention
    
Arbor
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
risk-based application security, security management, application security, software applications
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, anti spam, anti spyware, anti virus, compliance, ddos, disaster recovery
    
HP - Enterprise
Published By: Oracle     Published Date: Jul 20, 2016
This analysis explores the financial benefits - as well as the security and reliability benefits - of moving to the cloud. With cloud delivering 2.1 the ROI of on-premise applications with lower initial and ongoing costs, and the environmental benefits of going cloud, it’s hard to argue against the cloud.
Tags : 
cloud, finance management, roi, data management, cloud computing
    
Oracle
Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, security, anti spyware, application security, authentication, compliance, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention
    
Kaseya
Published By: Intralinks     Published Date: Apr 13, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: • Risk management – avoiding data breaches and loss of information that can result in non-compliance • Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device • IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols
Tags : 
    
Intralinks
Published By: Okta     Published Date: Jun 03, 2016
Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Okta is the identity management foundation for a cloud-first IT architecture that enables you to take the lead in adopting new applications and enabling mobile for your organization to drive growth. In this webinar with Okta, and customer Medallia, learn about the benefits of Okta Provisioning to maximize security, efficiency and productivity, and how Medallia recognized significant IT savings and >900% ROI. Speakers: Ed Sawma, Director Product Marketing, Okta Jonathan Hansen, Head of IT, Medallia
Tags : 
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, best practices, business intelligence, business management, business technology, cloud computing
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
77 Energy uses Okta to automate provisioning and deprovisioning tasks, so IT can focus on identifying and deploying business solutions, rather than worrying about whether or not users can access them. Hear Chris Dodds share how IT staff help people work efficiently and keep the company free of legacy business practices.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, it management, best practices, business technology
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence, cloud computing
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Have you ever wondered which enterprise cloud apps are most popular? Or which industries tend to use Office 365 versus Google Apps? Did you know that 43% of Okta customers have enabled deprovisioning? From where we sit, Okta has a unique view into the adoption and utilization of cloud apps in the enterprise. Our Businesses @ Work report takes an in-depth look into how organizations and people work today, and the apps and services they use to be productive.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
forrester, wave, web, application, firewalls, akamai
    
Akamai Technologies
Published By: Lookout     Published Date: Dec 09, 2016
Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.
Tags : 
    
Lookout
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.