next gen

Results 301 - 325 of 868Sort Results By: Published Date | Title | Company Name
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This paper discusses the need for and details of a Zero Trust approach to network security. It also itemizes the essential criteria and capabilities required of a Zero Trust solution, explains how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust design.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto Networks
Published By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : 
data security, security, cyber attacks, threat and vulnerability management
    
Centrify
Published By: Oracle OMC     Published Date: Nov 30, 2017
Demandbase and Oracle Eloqua introduce the next generation of B2B marketing by delivering Account-Based Marketing(ABM) directly into your MAS. Download this whitepaper now to learn more!
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
Your marketing budget and sales staff provide a finite set of parameters around how your business creates revenue. You need a way to get the most out of them while delivering on the brand promise and experience your customers expect. Enter Account-Based Marketing (ABM), the truest way to align your sales organization and marketing operations to drive holistic account interactions that yield higher returns. It’s the next generation of B2B marketing automation. According to Demandbase, “ABM is the process of identifying the companies most likely to buy, and then marketing to them. B2B companies understandably want to focus their marketing dollars on accounts with the highest potential to deliver sustainable revenue.”
Tags : 
    
Oracle OMC
Published By: Adobe     Published Date: May 16, 2012
Find out how the Nation's largest high school journalism program uses Adobe Creative 5.5 Master Collection to cultivate the next generation of award-winning print, broadcast, and web journalists.
Tags : 
cs5.5, creative suite, adobe, adobe creative suite, 5.5 master collection, pulitzer, print, broadcast, journalismlo alto
    
Adobe
Published By: Red Hat     Published Date: Apr 18, 2011
This IDC report discusses the clear benefits of cloud computing?and how to best obtain next-generation performance, flexibility, and savings with key technology and process considerations.
Tags : 
cloud computing, portability, and interoperability
    
Red Hat
Published By: Vidyo, Inc.     Published Date: Jul 17, 2009
Personal Telepresence is the next generation in video communication. It delivers affordable, universal, and reliable video communication. The VidyoConferencing system provides the solution to the business and technical challenges of personal telepresence
Tags : 
vidyo, telepresence, video communication, communication, mcu, h.264, svc, avc
    
Vidyo, Inc.
Published By: MicroStrategy     Published Date: Jan 23, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Apr 11, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Jun 11, 2019
The use of analytics has exploded across business, and the value it already has delivered has heightened executives' expectations. Now data can be processed in real time to meet a constantly widening range of analytic needs. How your organization utilizes them in the next decade will be essential to your success.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Jun 11, 2019
The use of analytics has exploded across business, and the value it already has delivered has heightened executives' expectations. Now data can be processed in real time to meet a constantly widening range of analytic needs. How your organization utilizes them in the next decade will be essential to your success. These developments come at an opportune time. Organizations are being over-whelmed by the rivers of data generated by applications and systems on-premises or flowing in via the cloud. At the same time, the cost of computational power has declined dramatically, making it practical to apply analytics to and generate information on just about anything. But no advance comes without challenges. While the widespread availability of analytics has created seemingly valuable insights, executives and managers are finding that those insights are not easily linked to steps that will improve business outcomes or optimize actions. Furthermore, analytics are not always easy for line of b
Tags : 
    
MicroStrategy
Published By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : 
virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi, scalability, legacy applications, data management, business technology, data center
    
AMD
Published By: Workday     Published Date: Mar 26, 2019
Changing student demographics can pose big challenges to higher education institutions. The ability to adapt is key to creating a place where everyone can succeed. This report from Inside Higher Ed dives deep into what these changes mean for your campus and how technology can help you meet the needs of a new generation of students.
Tags : 
    
Workday
Published By: Brainshark     Published Date: Oct 16, 2013
Running low on content for your next campaign? Learn how leading marketers are repurposing existing content and delivering it in a creative, targeted and measurable format that fuels successful lead generation—while also saving time and money.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark
Published By: McAfee     Published Date: May 19, 2014
A medida que la tecnología de firewall de próxima generación (NGFW - next-generation firewall) se convierte en más convencional, es el momento de revisar las capacidades y funciones avanzadas que separan a los líderes de los rezagados. En su forma más básica, el consenso de una definición de NGFW incluiría estas capacidades: funciones estándares de firewall como la inspección de estado y la traducción de direcciones de red, prevención de intrusiones integrada, control de aplicaciones y un cierto nivel de inteligencia e integración con bases de datos de vulnerabilidad y reputación.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusos, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti, it management
    
McAfee
Published By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
    
McAfee
Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad, gestión de ti, next generation firewall, networking
    
McAfee
Published By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw, ngips, ips de próxima generación, next generation firewall, next generation ips, seguridad, gestión de ti, it management
    
McAfee
Published By: McAfee     Published Date: Aug 15, 2014
À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti, next generation firewall, ngfw
    
McAfee
Published By: McAfee     Published Date: Aug 15, 2014
Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti, next generation firewall, ngfw
    
McAfee
Published By: McAfee     Published Date: Aug 21, 2014
Uma rede privada virtual (VPN, Virtual Private Network) proporciona o melhor retorno do investimento em proteção de comunicações. Porém, a falta de confiabilidade nos links da VPN é um fator de risco para comunicações críticas dentro das organizações. As redes constantemente disponíveis dependem de diversos provedores de serviços de Internet para garantir conectividade permanente e maior largura de banda. A aVPN (Augmented VPN) agrega todos os links dos provedores de serviços de Internet para disponibilizar um único túnel de alta capacidade. A aVPN é um modo simples e econômico de criar conexões rápidas, seguras e de alta capacidade entre sites, bem como garantir uma conectividade sem interrupções. Ela foi desenvolvida pensando na facilidade de uso e sua implementação não exige equipamentos/softwares especiais ou contratos de troca de tráfego com provedores de serviços de Internet.
Tags : 
vpn, rede privada virtual, firewall de próxima geração, mpls, bgp, vpn de alta disponibilidade, segurança, gerenciamento de ti, next generation firewall, ngfw, avpn, augmented vpn
    
McAfee
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.