Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 3395Sort Results By: Published Date | Title | Company Name
By: GeoTrust     Published Date: Oct 06, 2014

Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
    
By: GeoTrust     Published Date: Oct 06, 2014

"The business and security benefits of GeoTrust Enterprise Security Center IT departments face a range of issues—some obvious, some more subtle—when dealing with SSL certificates. These issues can have serious business and security consequences. GeoTrust Enterprise Security Center was designed with customer input to address these problems."

Tags : security center, it departments, ssl certificates, security consequences, customer input, manage, enterprise applications, ssl
    
By: GeoTrust     Published Date: Oct 06, 2014

For many business owners, launching an online shopping site makes perfect sense. However, there are some important things you should know before diving into the e-commerce marketplace. The online economy is ripe with opportunity, but it's also rife with pitfalls that can trip up even the savviest business person. This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.

Tags : e-commerce, online shopping, marketplace, setup, security, promotion, online economy, ssl
    
By: Workday     Published Date: Oct 06, 2014

Définition du véritable SaaS et des bénéfices pour votre entreprise

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, storage, web service security, mobile data systems
    
By: Workday     Published Date: Oct 06, 2014

Comment reconnaître les applications et fournisseurs de solutions Cloud efficaces

Tags : the cloud, cloud providers, cloud computing, modern saas, mobile computing, mobile data systems, virtualization, mobile device management
    
By: cPacket Networks     Published Date: Oct 02, 2014

The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.

Tags : cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network
    
By: EMC Corporation     Published Date: Oct 01, 2014

RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.

Tags : cyber attacks, live, virtual, security, analytics, ecat
    
By: EMC Corporation     Published Date: Oct 01, 2014

RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.

Tags : cyber attacks, live, virtual, security, analytics, ecat
    
By: EMC Corporation     Published Date: Oct 01, 2014

Find out by watching the RSA Security Analytics and RSA ECAT on-demand video.

Tags : cyber attacks, virtual, security, analytics, ecat
    
By: EMC Corporation     Published Date: Oct 01, 2014

Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.

Tags : security, analytics, incidents, ecat, logs
    
By: EMC Corporation     Published Date: Oct 01, 2014

RSA Security Analytics 10.4 and RSA ECAT 4.0 will be revealed when you watch this on-demand event.

Tags : security, analytics, incidents, ecat, logs
    
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
By: Singlehop     Published Date: Oct 01, 2014

As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.

Tags : cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
    
By: OpenText     Published Date: Oct 01, 2014

Interactions with technology and customers have evolved to new heights. Organizations that create a rich and consistent digital presence across many channels will thrive in the global marketplace. The challenge is to extract value from managed content, optimize, and personalize that content delivery, and bridge the chaotic interactive world with the secure data repositories that reside behind the firewall. In today's customer-centric era, brands must deliver compelling and engaging experiences fueled by a contextual understanding of their global customers, all while adhering to established information governance policies and standards.

Tags : opentext, cem, omni-channel, adaptive content, secure data, global marketplace, customer centric, brands
    
By: OpenText     Published Date: Oct 01, 2014

Customer experiences have evolved tremendously over the years. Technology has made buyers smarter and more empowered; with online reviews and mobile web access, customers know more about a company's products, services, competitors, and pricing than the organization may know itself. Today's consumers expect tailored, engaging experiences and rich content delivered seamlessly across a variety of touch points.

Tags : opentext, cem, digital asset management, onmi channel, rich media, online reviews, mobile web access, engagement
    
By: EMA     Published Date: Oct 01, 2014

A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:

Tags : quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
    
By: Bit9     Published Date: Sep 30, 2014

For enterprises, relying on perimeter defenses as well as traditional endpoint protection is no longer suitable to combat today’s threats. There is a good reason for that, since solutions including signature-based antivirus have not kept pace in combating advanced threats or zero-day attacks leaving devices defenseless.

Tags : endpoint protection, server security, perimeter defenses, security, business analytics, risk management, content management system, service management
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : server security, virtual servers, data breaches, targeted attacks, security, business analytics, risk management, secure content management
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : data center security, server security, targeted attacks, data breaches, security, it management, knowledge management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This SANS whitepaper discusses the methodology of internal and external attacks on data center servers and the applications running on them. It also discusses why, even with our layers of security in place today, servers are still vulnerable, and how organizations can leverage application controls to permit what is known and trusted while denying everything else.

Tags : server security, platform protection, data center servers, server vulnerability, security, knowledge management, best practices, project management
    
By: Bit9     Published Date: Sep 30, 2014

In this whitepaper Microsoft MVP, Brien M Posey, outlines the mechanisms available to IT administrators in Windows 8.1 and Windows Server 2012 R2 looking to lock down endpoint devices and servers against advanced threats and why those measures alone are insufficient to ensure strong application control posture in your environment.

Tags : application control, endpoint devices, it administrators, application control, security, it management, knowledge management, application performance management
    
By: CradlePoint     Published Date: Sep 30, 2014

While short outages are common, longer service disruptions – due to weather, human error or even squirrels – can be catastrophic, paralyzing business operations. Your organization can feel the consequences long after the connection has been repaired. This white paper explores the benefits of using 4G LTE as a back up solution to maximize revenue and minimize business risk downtime can have on your brand. You’ll learn how a 4G wireless solution has benefits over wired backup solutions for business continuity. Please download the whitepaper to learn more!

Tags : failover, security risks, crisis communications, security breaches, compromising customer data, security
    
By: Foxit     Published Date: Sep 18, 2014

IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?

Tags : foxit, document management strategy, revenue generated technology, storage, security, tight budgets, pdf solutions, enterprise applications
    
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: Centrify Corporation     Published Date: Sep 16, 2014

A single, unified solution for managing Macs and mobile devices, Centrify User Suite, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory, letting your IT department leverage existing expertise, tools and processes. By managing user identity and authentication in Active Directory, Centrify User Suite, Mac Edition, extends Group Policy-based security management to Mac and mobile users. In addition, the solution supports smart-card login to Active Directory by Mac users. Your employees reap the rewards that come with effortless access to information, applications and services. And the enterprise benefits from a unified, integrated management solution that maximizes security, streamlines operations and reduces cost.

Tags : parallel infrastructure, enterprise, centralized management, user identity and authentication, active directory, enterprise benefits, streamline operations, security
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.