"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

web security service

Results 1 - 25 of 57Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive, security, web services, web service security, productivity
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : 
healthcare, information security, web security, data management, technology, cloud services, security, network performance, network performance management, network provisioning, network security, best practices
    
Akamai Technologies
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications
    
Veracode
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations The best use cases for implementing a supplemental or secondary DNS service
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: • How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure • The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations • The best use cases for implementing a supplemental or secondary DNS service Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: MessageLabs     Published Date: May 28, 2008
Whether its spyware hidden amidst a seemingly innocuous download, a “spoofed” social networking identity, or phishing emails that gain access to valuable information, web and email-based security threats are more advanced and more covert than ever before. Learn how MessageLabs integrated web and email security services protect your business.
Tags : 
    
MessageLabs
Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how one of the UK’s leading charities used the Webroot® Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting. In addition, since the vast majority of Scope’s workers are mobile the organization needed a solution to protect them.
Tags : 
scope charity, disabled, services, opportunities, complex, support, peer-to-peer suppot, education and learning, short-breaks, residential care, supported employment
    
Webroot UK
Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity, security management, cloud computing, infrastructure, design and facilities
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security, business continuity, security management, cloud computing, infrastructure, design and facilities
    
Cisco
Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security, application security
    
Webroot
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : 
trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, internet content security, smart protection network
    
Trend Micro Inc.
Published By: Amazon Web Services     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
Amazon Web Services
Published By: Cisco     Published Date: Jun 12, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security, cloud computing, infrastructure, design and facilities
    
Cisco
Published By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections, anti-botnet, denial-of-service, dha, dos, intrusion detection, security, network security, access control, application security, security management, security policies
    
MX Logic
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing, it management, data center
    
Dell Software
Published By: Symantec.cloud     Published Date: Apr 27, 2010
Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.
Tags : 
messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard, security management
    
Symantec.cloud
Start   Previous   1 2 3    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory