Display search results for ** instead (213 products)
29 Aug 2014  |  North America
This SPIE will analyze the value of bot detection in a security model; the perceived value of such features; the methods used to detect bots, and their respective effectiveness.
12 Sep 2014  |  North America
The bad guys are getting better quicker than the good guys are improving, despite the good guys proclivity to spend to keep the bad guys out. This situation prompts Stratecast to question whether security expenditures are being directed optimally. In other words, is spending rational? If not, is there a lack of more effective security solutions? O...
26 Sep 2014  |  North America
This weeks SPIE will expand the readers understanding of Big Data security issues, and introduce new data-centric approaches from vendors who are focused on resolving those issues.
30 Sep 2014  |  North America
This research provides insight into the network security service-delivery platforms employed by MSSPs--The number of platforms employed by each MSSP; Ranking of each network security platform; Ranking of each platform vendor; Keys to success for network security platform providers with MSSPs.
17 Oct 2014  |  North America
In this SPIE, we examine the environmental factors creating the need for automation within our network security environments. The necessary steps to get to automation are discussedsteps that we refer to as the network security manageability tool evolution. Finally, we discuss automation, and provide an example of a company taking an innovative app...
07 Nov 2014  |  North America
In this SPIE, we examine an alternative approach of pushing security processing outward to the edge of carrier networks.
12 Dec 2014  |  North America
In this SPIE, Stratecast describes how AWS is breaking the cloud not secure enough adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
23 Jan 2015  |  North America
With the ascension of the cloud, and changes in the provider community and new services and features being a routine occurrence, the need for navigational assistance is not surprising. What is potentially more interesting is how the surgical focus of CMPs on their customers workloads will change how IT and security technologies and services will b...
13 Feb 2015  |  North America
In this SPIE, we discuss the role of signature based defenses in this new APT reality. We also discuss behavioral-based cyber defenses. Finally, we delve into one form of behavioral cyber defense: advanced security analytics.
13 Mar 2015  |  North America
This SPIE examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.