Whitepaper Library
 

web

Results 201 - 225 of 3841Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams, defence, key topics, security guidance, data center
    
Websense
Published By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates today’s advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : 
websense threat report, security, websense, sophisticated security, web security, phishing, data center
    
Websense
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, data center
    
Websense
Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions, major it security strategy, data center
    
Websense
Published By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : 
miercom, security, effectiveness, report, protect, network, threats, solutions
    
Websense
Published By: Websense     Published Date: Apr 09, 2013
This report focuses on significant changes in the global threatscape during the year, offering insights from several perspectives. Our goal is to help security professionals improve the effectiveness of existing security solutions, and identify and prioritize security gaps that may require new approaches and more innovative strategies.
Tags : 
websense, 2013, threat report, cyber, websites, effectiveness, security, solutions, strategies
    
Websense
Published By: HP     Published Date: Dec 05, 2014
Get expert insight from HP and IDG in this brand new webinar. Discover how the new style of IT changes the rules of business. Choose from 4 chapters or watch them all to learn about optimizing compute economics and speeding IT service delivery to achieve better business outcomes. Register now to get started.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: HPE     Published Date: May 04, 2015
Get expert insight from HP and IDG in this brand new webinar. Discover how the new style of IT changes the rules of business. Choose from 4 chapters or watch them all to learn about optimizing compute economics and speeding IT service delivery to achieve better business outcomes. Register now to get started.
Tags : 
    
HPE
Published By: Dell EMC     Published Date: May 10, 2017
Join experts from IDC and Dell EMC to discover how converged and hyper-converged infrastructure is paving the path to the future—enabling IT leaders to do more with less in today’s quickly changing, fast-paced world. Watch the free webcast from Dell and Intel® today.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 17, 2017
For many companies the appeal of the public cloud is very real. For tech startups, the cloud may be their only option, since many don’t have the capital or expertise to build and operate the IT systems their businesses need. Existing companies with established data centers are also looking at public clouds, to increase IT agility while limiting risk. The idea of building-out their production capacity while possibly reducing the costs attached to that infrastructure can be attractive. For most companies the cloud isn’t an “either-or” decision, but an operating model to be evaluated along with on-site infrastructure. And like most infrastructure decisions the question of cost is certainly a consideration. In this report we’ll explore that question, comparing the cost of an on-site hyperconverged solution with a comparable set up in the cloud. The on-site infrastructure is a Dell EMC VxRailTM hyperconverged appliance cluster and the cloud solution is Amazon Web Services (AWS).
Tags : 
public cloud, it systems, data center, it agility, hyperconverged solution, hyperconverged appliance
    
Dell EMC
Published By: SAP     Published Date: May 22, 2012
Is turning data into information still a challenge for your company? If so, you are not alone. View this on-demand Webinar with SAP and HP to learn how you can manage ever-increasing amounts of data; provide this data to business users to make critical decisions in a timely fashion; and enable true self-service business intelligence (BI) for business users.
Tags : 
sap, business solutions, business technology, enterprise, technology, enterprise analytics
    
SAP
Published By: SAP     Published Date: May 22, 2012
View this live Webcast from the Aberdeen Group that features senior research analyst for business intelligence Mike Lock. Learn how best-in-class companies are delivering broader access to information in a shorter time frame to facilitate substantial improvement in key business performance metrics.
Tags : 
crm-us12-onl-mlql
    
SAP
Published By: Alert Logic     Published Date: Sep 03, 2014
As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.
Tags : 
alert logic, amazon web security solutions, aws business model
    
Alert Logic
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. That’s why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management solutions vary a lot too. Vendors say they can solve your bot problems. Can they? The bot management market is evolving, with many vendors of different sizes, experiences and capabilities. It’s important to solve your bot problems without getting in the way of business. In this ebook, you’ll get insight into how to evaluate bot management solutions and understand what the differences mean for you.
Tags : 
credential abuse, bots, marketing, bot management, bot solutions
    
Akamai Technologies
Published By: Amazon Web Services     Published Date: Apr 27, 2018
One of the value propositions of an Internet of Things (IoT) strategy is the ability to provide insight that was previously invisible to the business. But before a business can develop a strategy for IoT, it needs a platform that meets the foundational principles of an IoT solution. Amazon Web Services (AWS) believes in some basic freedoms that are driving organizational and economic benefits of the cloud into businesses. These freedoms are why more than a million customers already use the AWS platform to support virtually any cloud workload. These freedoms are also why AWS is proving itself as the primary catalyst to any Internet of Things strategy across commercial, consumer, and industrial solutions. This paper outlines core tenets that should be considered when developing an IoT strategy, the benefits of AWS in that strategy and how the AWS cloud platform can be the critical component supporting those core tenets.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Apr 28, 2018
Les technologies d'intelligence artificielle telles que l'apprentissage machine et le Deep Learning permettent d'obtenir des informations et de la précision à deux marques majeures dans des secteurs très différents : la santé et les assurances. Des théories sur les futures incidences de l'intelligence artificielle (IA) sur les entreprises et la société vont florissantes. Mais la réalité du terrain aujourd'hui pour les entreprises et les dirigeants appliquant des technologies comme l'apprentissage machine et l'apprentissage profond à leurs enjeux majeurs est déjà très enthousiasmante. Les modèles de fonctionnement sont refondés en se basant sur les informations obtenues de puissantes capacités cognitives. De nouveaux produits et services améliorent l'expérience client, voire la condition humaine. D'une façon très concrète et significative, l'IA change le monde pour le meilleur.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Apr 28, 2018
AI-Technologien wie Machine Learning und Deep Learning liefern zwei großen Marken in zwei sehr unterschiedlichen Branchen – Gesundheit und Versicherungen – Insights und Genauigkeit. Theorien zu den zukünftigen Auswirkungen künstlicher Intelligenz (AI) auf die Geschäftswelt und die Gesellschaft sind allgegenwärtig. Aber die Realität, wie Unternehmen sie kennen, die Technologien wie Machine Learning und Deep Learning anwenden, ist schon aufregend genug. Geschäftsmodelle werden anhand der Insights umgestaltet, die durch die leistungsstarken kognitiven Funktionen generiert werden. Neue Produkte und Dienstleistungen verbessern das Benutzererlebnis – um nicht zu sagen die menschliche Existenz. Auf sehr reale und bedeutsame Weise verbessert AI die Welt.
Tags : 
    
Amazon Web Services
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.