advanced persistent threat

Results 51 - 72 of 72Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, data management, business technology
    
IBM
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
Advanced Threat Protection with Dell SecureWorks Security Services
Tags : 
dell, dell secureworks, advanced threat protection, advanced persistent threats, apt, security services
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
Every year some new shiny object seems to be working security marketers into a frenzy. The Advanced Persistent Threat hype continues to run amok 3 years in, and doesn’t seem to be abating at all. Of course there is still lot of confusion about what the APT is, and a Securosis post from early 2010 explains our view pretty well.
Tags : 
dell, dell secureworks, ciso’s, advanced attackers, apt, attack process
    
Dell SecureWorks
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: May 28, 2013
Advanced Persistent Threats (APT) are a serious concern in today’s threat landscape. They represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government suppliers, thereby threatening the victim country’s national mission.
Tags : 
    
Dell SecureWorks
Published By: FireEye     Published Date: Apr 07, 2013
Malware activity has become so pervasive and attacks so successful at penetrating legacy defenses.
Tags : 
fireye, threat report, malware, threat landscape, legacy defenses, advanced persistent threat, apt
    
FireEye
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security, kernel level security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem
    
McAfee
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: Symantec     Published Date: Jan 11, 2013
Threats to web application are becoming increasing complex - from malware and advanced persistent threats to data leaks. This guide is made to address your needs and provides a step by step to assess your security needs.
Tags : 
ssl, web application, shortcut guide, web application threats, shortcut guide, symantec, it management, business technology
    
Symantec
Published By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : 
cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat, business technology
    
FireEye
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage
    
Damballa
Published By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : 
security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, business technology
    
Splunk
Published By: FireEye     Published Date: Sep 13, 2012
This report provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations' networks today.
Tags : 
fireeye, threat report, cybercriminals, apt, 1h 2012, business technology
    
FireEye
Published By: Proofpoint     Published Date: Apr 06, 2012
Download this white paper from Osterman Research and Proofpoint to learn how the protection of corporate data from sophisticated malware and phishing attacks is at top of mind of IT decision makers.
Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing, malware, anti-malware, security, spam, osterman research, proofpoint, whitepaper, white paper, email archiving, email security, cloud, report
    
Proofpoint
Published By: M86 Security     Published Date: Feb 09, 2011
This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.
Tags : 
m86 security, threats, best practices, phishing, vulnerability, advanced persistent threats, apts
    
M86 Security
Published By: M86 Security     Published Date: Nov 01, 2010
This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.
Tags : 
m86 security, threats, best practices, phishing, vulnerability, advanced persistent threats, apts
    
M86 Security
Start   Previous    1 2 3     Next   End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.