HR Hero Your Employment Law Resource
 

detection

Results 101 - 125 of 513Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : 
it security, it security investments, cyber threats, malware detection
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
it security, cyber threats, threat detection
    
Kaspersky Lab
Published By: Damballa     Published Date: Nov 13, 2012
How Advanced Malware Morphs to Remain Stealthy and Persistent
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : 
hacker detection, advanced evasion techniques, network security, it security, security management
    
McAfee
Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect against advanced attacks.
Tags : 
threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
Vectra Networks
Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect prominent securities.
Tags : 
firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt
    
Vectra Networks
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
    
Vectra Networks
Published By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat, ips, ids, firewall
    
Vectra Networks
Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : 
utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats
    
Vectra Networks
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Fiserv     Published Date: Sep 14, 2017
Sanctions screening and fraud prevention solutions use real-time detection to prevent terrorist financing and financial crime; whereas anti-money laundering (AML) primarily follows an “observe and report” process. Such a process is all that is currently required by many regulators. Increasingly though, international compliance teams are choosing to stop transactions before they are executed – based on suspicions of money laundering activity. More and more, the industry has been asking itself if this approach of rejecting suspicious activity is a more effective strategy to prevent money laundering. This paper explores where and why AML real-time detection might make sense as a new paradigm for global financial institutions.
Tags : 
aml, anti-money laundering, compliance, regulatory compliance, financial crime, financial crimes, financial action task force, fatf
    
Fiserv
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : 
cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting
    
Fiserv
Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 21, 2018
Are you looking for a “sophisticated threat hunting product”? Find out why Forrester says this about our product and named us a leader in Endpoint Detection and Response. Download the complete Forrester Wave on Endpoint Detection and Response to see how Carbon Black is scored among its peers. The Forrester Wave evaluates solutions for: • - The strength of their current offering • - Their strategy and vision for the future • - Their market presence
Tags : 
    
Carbon Black
Published By: Sauce Labs     Published Date: May 30, 2018
If you work in DevOps or software QA, you likely already know why automated software testing is essential for quality control to keep pace with continuous delivery. Automated testing delivers faster results and more thorough coverage, and enables shift-left testing for earlier detection of bugs. Yet the issue of how to approach automated testing remains difficult for many QA teams to solve. A range of obstacles makes it challenging to begin automating software tests, or to increase the extent of test automation beyond the basics.
Tags : 
    
Sauce Labs
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Complete enterprise security requires coordination. Firms must integrate the technologies and data that come from the endpoint and network layers to make accurate decisions that ensure optimal threat detection, containment, and remediation. Unfortunately, too many firms rely on a huge variety of solutions that require manual integration and correlation, leading to wasted time and poor threat detection. Security leaders must automate these processes to eliminate detection lag and improve prevention efforts.
Tags : 
    
Cisco DWA Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.