Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 3113Sort Results By: Published Date | Title | Company Name
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: Symantec Corporation     Published Date: Jun 18, 2014

Business owners require flexibility and scalability in their efforts to build trust and protect online sites and transactions from Hackers. Hackers are constantly developing more sophisticated methods to breach security protections and inflict damage on a business or its customers. This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jun 18, 2014

Compliance is a fast-moving target, and itís getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jun 18, 2014

This white paper will present the lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, why poor management is potentially dangerous to the enterprise, and how the right SSL certificate management tool can help enterprises keep track of and manage SSL certificates more effectively.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jun 18, 2014

This guide provides five simple steps for IT professionals to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates throughout their lifecycle.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jun 18, 2014

This paper explores the true TCO for self-signed SSL certificates, including a side by side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jun 18, 2014

Web sites now generate more than $7 trillion in worldwide Internet ecommerce. Web applications are used to purchase products, obtain critical information, and enable a host of other key business processes. While using these applications greatly enhances business opportunities, the openness inherent in Web applications exposes companies to threat actors who can access mission-critical back-end databases and garner confidential information. Accordingly, having proper authentication safeguards in place is an essential component of any good Web security strategy. Download to learn how Symantec is mitigating web security with SSL certificates!

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jun 18, 2014

Information security professionals who want to want to understand how to protect their systems from Heartbleed vulnerability should read this paper!

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Cisco     Published Date: Jun 16, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : access control, anti spam, anti spyware, anti virus, email security, internet security, web service security
    
By: Cisco     Published Date: Jun 16, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, mitigating attacks, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 16, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spyware, anti virus, internet security
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity
    
By: Cisco     Published Date: Jun 16, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, cisco, email security, threat detection network, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 16, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 16, 2014

How Ciscoģ Web Security enables better data and brand protection for todayís enterprises.

Tags : web security, cisco, brand protection, security, internet security, intrusion detection, intrusion prevention, web service security
    
By: Cisco     Published Date: Jun 16, 2014

How Ciscoģ Web Security enables better data and brand protection for todayís enterprises.

Tags : web security, cisco, brand protection, security, internet security, intrusion detection, intrusion prevention, web service security
    
By: distilnetworks     Published Date: Jun 13, 2014

In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.

Tags : block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping
    
By: Alert Logic     Published Date: Jun 12, 2014

Alert logicís cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logicís solutions and the unique benefits offered.

Tags : pci, pci dss, payment security, compliance, cloud pci, security, it management
    
By: Alert Logic     Published Date: Jun 12, 2014

New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!

Tags : cloud security, vulnerability management, vulnerabilities, patching, patch management, security, it management
    
By: Alert Logic     Published Date: Jun 12, 2014

In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment.

Tags : cloud security, public cloud, amazon web services, cloud pci, secure cloud, security, it management
    
By: Cisco     Published Date: Jun 12, 2014

U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.

Tags : cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study, access control, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 12, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spam, anti spyware, anti virus
    
By: Cisco     Published Date: Jun 12, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : cisco web security, malware, high risk sites, anti spam, anti spyware, anti virus, email security, internet security
    
By: Cisco     Published Date: Jun 12, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.