Displaying 31 - 38 of 38
Security Roundtable Article
Back to the Basics: A Necessary Grind for Online Retailers
If we’ve learned anything from recent security breaches faced by several unfortunate retailers, it’s that often the attacks …
Erin Nealy Cox,
Security Roundtable Article
‘Poor Cyber Hygiene’: Three Dirty Words for Online Retailers
Breakdowns in routine cyber hygiene have resulted in several recent security breaches at online retailers. CISOs, CIOs, and …
Erin Nealy Cox,
Security Roundtable Article
Four Big Cyber Risks Facing CMOs this Holiday Season
Tis the season for costly cyberattacks and breaches, seasonal employees with access to sensitive data, malicious ad bots, …
Stephanie Overby,
Security Roundtable Article
Machine Learning Knows It Wasn’t You Who Swiped Your Credit Card
You’re sitting at home minding your own business when you get a call from your credit card’s fraud …
Security Roundtable Article
Happy Holidays! You’ve Been Hacked!
Businesses of every shape and size must be particularly vigilant during the holiday season. Scammers and cybercriminals rely …
Sam Greengard,
Security Roundtable Article
Blockchain For Beginners: Year of Hype, Year of Promise
The speaker took the stage in front of an audience of marketing professionals and pulled up a slide …
Mercedes Cardona,
References and Case Studies
株式会社東急ハンズ
出口対策に有効な仮想化次世代ファイアウォールを導入
東急ハンズは2017年10月、内部ネットワークとインターネットのゲートウェイに設置するセキュリティ対策機能として、パロアルトネットワークスの仮想化次世代ファイアウォール「VM-Series」を導入、運用を開始した。アマゾン ウェブ サービス(AWS)による“100%クラウド"
を推進する同社では、セキュリティ強化の一環として標的型サイバー攻撃の出口対策に有効なアプリケーションの可視化・制御を行うソリューションの導入を検討。日本のAWSユーザーが集まる「JAWS-UG(AWS Users Group-Japan)」での評価も参考にしながら機能・性能を比較した結果、VM-Seriesを選定したという。
Whitepaper
Secure the Network through Application Visibility PDF
Governments and businesses must continuously assess the use of new applications and services that improve processes and operations. As such, they must weigh the business benefits from the adoption of newly sanctioned applications against potential risk to the business, its data and other resources. Applications themselves, such as remote access, can represent undue risk. In addition, if applications are not appropriately secured in the business network, today’s attackers can hide communications within the very communication mechanisms the applications use. Adoption of security that appropriately identifies, granularly controls and secures enterprise applications can be slow if those charged with such controls don’t understand the necessity, value or ease with which appropriate controls can be adopted.
Download our use case "Secure the Network through Application Visibility" for the benefits of this approach, along with some common concerns over adoption, and read about the experiences of several customers across different industries who made this transition.
Displaying 31 - 38 of 38