security automation

Results 1 - 25 of 94Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : 
centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
Cisco EMEA
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: Dell Server     Published Date: Aug 24, 2018
Edge computing will soon become the new norm as we enter the era of zettabytes and billions of connected devices. Dell EMC PowerEdge servers are uniquely designed to meet the demands of edge computing with integrated security, no-compromise scalability and intelligent automation.
Tags : 
    
Dell Server
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices for securing and protecting your Hybrid IT environments from HPE’s Advisory Consulting services. Businesses and organizations are building new hybrid infrastructures to deliver new IT services that require agility, resiliency and security. Success will require more automation, integration and end-to-end visibility supported by threat intelligence and threat analytics. This blueprint provides proven strategies and approaches based on the IT digital transformation experience and many customer engagements. It will help customers determine where to start and how to approach this topic
Tags : 
    
Hewlett Packard Enterprise
Published By: Juniper Networks     Published Date: May 04, 2018
Business leaders are eager to leverage new technologies, and IT leaders can't afford to fall behind. Hybrid IT environments take advantage of private and public clouds but need enhanced security, automation, orchestration, and agility.
Tags : 
    
Juniper Networks
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell EMC & Intel
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Gartner’s Continuous Delivery Automation Magic Quadrant (MQ) analyzes the current market solutions and their effectiveness in responding to the demands of the modern business. The MQ is created on a tool’s ‘ability to execute’ and its ‘completeness of vision.’ When assessing CA Continuous Delivery Automation, Gartner highlights its ability to ‘provide scalability, resilience, security and enterprise management connectivity.’ The analysis also goes much deeper to cover the strengths, weaknesses and various nuances of all the automation products on the market.
Tags : 
    
CA Technologies_Business_Automation
Published By: Schneider Electric     Published Date: Jun 05, 2018
Balancing the increased pressure to improve productivity and quality, while reducing cost against mandated safety regulations is one of the most complex challenges in industry today.
Tags : 
process automation, ecostruxure plant, operational profitability, cybersecurity, safety, smart control, empowered operators, optimized assets, future of automation, reliability
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Integrating safety and process environments can improve reliability, profitability and cybersecurity. Read Frost & Sullivan’s white paper and plan your digital transformation today.
Tags : 
process safety, profitable safety, smart control, empowered operators, optimized assets, future of automation, reliability, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Since the sepia-toned days of the early 19th century, industry has sought effective ways to control manufacturing and production processes. New technology has greatly influenced factories and plants, resulting in new operational approaches to maximize benefits and achieve 100% ROI in a very short time.
Tags : 
process control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : 
smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Today’s plants are faced with managing two major challenges: the increasing speed of business and integrating emerging technologies. Leveraging IIoT as a basis for plant modernization could result in big payoffs: download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, operational profitability
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Profitable reliability is the next evolution of maintenance technology solutions. The result will be greater levels of operational profitability, safety, and reliability. Understand the three steps to get you there.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Balancing the increased pressure to improve productivity and quality, while reducing cost against mandated safety regulations is one of the most complex challenges in industry today.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Empower your workforce to control operational efficiency, reliability, safety, and profitability together — in real time. Ignite your profit engine today through EcoStruxure™ Foxboro DCS.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
When effectively applied in a cement plant, automation and control technologies can significantly reduce energy expenses, while helping to increase production and reduce waste.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, cement, cement plant
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Measure, empower and improve your continuous improvement process in your gas plant and maximize operational profitability.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, natural gas, natural gas plant
    
Schneider Electric
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this TechTarget report and learn how to: Improve operational efficiency Strengthen end-to-end enterprise security Find the right automation solution Deliver bottom-line results
Tags : 
    
Juniper Networks
Published By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : 
network security, it security, firewall, resource optimization, security management
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation
    
McAfee
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile
Start   Previous   1 2 3 4    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.