Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 2867Sort Results By: Published Date | Title | Company Name
By: Symantec Corporation     Published Date: Feb 25, 2014

The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.

Tags : mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware, security management
    
By: Symantec Corporation     Published Date: Feb 25, 2014

The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.

Tags : symantec, mobile, mobile applications, security, code signing certificates, security management, security policies, vulnerability management
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: Kaseya     Published Date: Feb 11, 2014

Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.

Tags : kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
By: Lumension     Published Date: Feb 07, 2014

Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.

Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?

Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
By: Lumension     Published Date: Feb 07, 2014

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.

Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
By: Lumension     Published Date: Feb 07, 2014

Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Lumension     Published Date: Feb 07, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Mashery     Published Date: Feb 06, 2014

Enterprise IT faces a new kind of tension: the API economy on the one hand, where enterprises drive new revenue streams by (gulp) publishing corporate data APIs for third-party developers to use, and SOA on the other, where tight governance is the name of the game. But the loose coupling in RESTful web services forces a discipline all its own.

Tags : mashery, apis, soa, api strategy, define goals, iterating, it management, data and content
    
By: BMC Software     Published Date: Jan 31, 2014

Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.

Tags : bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
By: BMC Software     Published Date: Jan 31, 2014

With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well articulated interfaces defining the data that is traveling back and forth. With the right integration strategy, SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.

Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, bmc, it management
    
By: BMC Software     Published Date: Jan 31, 2014

What happens when you take best practices for IT service management (ITSM), add technology to support those practices, and then throw social media into the mix? BMC explores how best-in-class organizations are leveraging these to drive user satisfaction and organizational success.

Tags : it service management, service desk, help desk, saas help desk, cloud help desk, bmc, networking, it management
    
By: Webroot UK     Published Date: Jan 30, 2014

In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.

Tags : webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard
    
By: McAfee     Published Date: Jan 28, 2014

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Tags : epp, endpoint, protection, threats, malware, nss, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 28, 2014

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : av-test, deep defender, rootkits, detection, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Jan 28, 2014

BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.

Tags : endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware, anti virus, encryption, internet security
    
By: McAfee     Published Date: Jan 28, 2014

Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.

Tags : blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam
    
By: McAfee     Published Date: Jan 28, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : gartner, endpoint protection, anti spam, anti spyware, anti virus, encryption, firewalls, security management
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: Entrust     Published Date: Jan 24, 2014

Smart credentials are the best bet for strong physical and logical access security

Tags : entrust, security, cloud access, digital security, security software
    
By: Entrust     Published Date: Jan 24, 2014

Know the truth: Mobile devices more secure than traditional PCs

Tags : entrust, mobile devices, mobile, security, mobile security, mobile perception
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.