Display search results for ** instead (17 products)
23 Jan 2015  |  North America
With the ascension of the cloud, and changes in the provider community and new services and features being a routine occurrence, the need for navigational assistance is not surprising. What is potentially more interesting is how the surgical focus of CMPs on their customers workloads will change how IT and security technologies and services will b...
28 Jan 2015  |  North America
In this Market Insight, Frost & Sullivan examines how NAC platforms are used to control end-user network access, help with compliance, provide security, and set policy controls in different market verticals and use cases. However, before making more precise statements about how NAC platforms are designed to help specific businesses and vertical mar...
USD 3,000.00 save 25 %
13 Feb 2015  |  North America
In this SPIE, we discuss the role of signature based defenses in this new APT reality. We also discuss behavioral-based cyber defenses. Finally, we delve into one form of behavioral cyber defense: advanced security analytics.
13 Mar 2015  |  North America
This SPIE examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
27 Mar 2015  |  North America
In this SPIE, we examine database security fundamentals that help to ensure high levels of flexibility in data use, and effectiveness in data protection.
17 Apr 2015  |  North America
This weeks SPIE explains why antivirus software, commonplace on PCs, is still a rare and inadequate occurrence for most smartphones, tablets, and IoT devices. The report points out the growing threat to personal data from theft and identity schemes. It also explains how network-based security, allied with antivirus software, offers a major shield ...
15 May 2015  |  North America
In this report, we share survey results on consumers concern and the degree to which they are addressing that concern in protecting their login credentials. Despite consumers efforts, the reality is that they are out-gunned by cybercriminals and others that prey on the vulnerabilities inherent in online lifestyles. Consumers therefore need assist...
02 Jun 2015  |  North America
In this insight, we briefly outline the primary approaches to building customized security in the cloud, and then we turn our attention to the FireHost approach.
10 Jul 2015  |  North America
In this SPIE, we explore Menlo Securitys malware-defeating approach and state our opinions on its market ramifications.
28 Aug 2015  |  North America
Hybrid Networks: The 21st Century Enterprise Network Reality Requires Concurrent Protection across Three Environments
This weeks SPIE discusses evolving enterprise network topologies, and the resulting security concerns, with an emphasis on hybrid networks. Hybrid networks are also discussed from the perspective of the 3 tenets of security: visibility, control, and predictability.