Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 3646Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Jan 14, 2015

Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.

Tags : ddos attack, integration, mitigation, ddos outage, business protection, business security, infrastructure, ddos
    
By: Dyn     Published Date: Jan 14, 2015

Whether you are a seasoned expert or just beginning to look into how DNS can improve the performance of your businesses’ services, let this quick guide to DNS terminology be your comprehensive one-stop shop.

Tags : dns, domain name system, ip addresses, terminology, denial of service, query, cache, dns client
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper outlines the defense-in-depth strategy that complements the traditional security solutions to provide protection against ATP's across all four phases of the attack.

Tags : advanced persistent threats, apts, defense-in-depth strategy, new security strategies, ca security, security, wireless security, application performance management
    
By: IBM     Published Date: Jan 09, 2015

IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out the average number of breached records per company, the real reasons most data breaches occur, the capital outlays that a breach requires, and the rate at which customers abandon companies after a breach occurs.

Tags : data breaches, data breach detection, business continuity management, malware, security, knowledge management, data management, business analytics
    
By: IBM     Published Date: Jan 09, 2015

This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.

Tags : security solutions, it security, security risks, threat intelligence report, malware, botnet infections, security, it management
    
By: IBM     Published Date: Jan 09, 2015

Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.

Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
By: IBM     Published Date: Jan 09, 2015

As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage

Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
By: IBM     Published Date: Jan 09, 2015

Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? You’ll better understand the value that firms are deriving from UC, the status of its adoption, and the barriers to full implementation.

Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
By: CA Technologies     Published Date: Jan 09, 2015

This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.

Tags : api management, business security, components of api management, api solutions, enterprise level api management, access control, application security, application performance management
    
By: CA Technologies     Published Date: Jan 09, 2015

This White Paper provides information on how enhance delivery secure and improve customer experience.

Tags : security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions, access control, anti spam, application security
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.

Tags : apis, risks of apis, apis can increase organization's risks, api security, access control, anti spam, application security, disaster recovery
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.

Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.

Tags : identity-based security, business protection, identity, security solutions, new trends to secure business, access control, application security, authentication
    
By: CA Technologies     Published Date: Jan 09, 2015

This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.

Tags : byod, identity, byoid benefits, access control, application security, authentication, identity management, intrusion prevention
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.

Tags : authentication, security, risk-based authentication, network security, access control, password management, security management, web service security
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.

Tags : web application delivery, session hijacking, security, ca single sign-on, application security, policy based management, security policies, single sign on
    
By: CDW     Published Date: Jan 07, 2015

Learn how Microsoft’s end of support for its 2003 Windows Server presents the best opportunity for a technology upgrade and see what your organization should do to take advantage of this unique opportunity.

Tags : server, performance, migrating systems, technology, update, support, microsoft, security
    
By: Firehost     Published Date: Jan 07, 2015

This Webinar covers all of the details you will need to know about PCI DSS 3.0.

Tags : pci dss 3.0, data security program, risk management practices, pci, backup and recovery, access control, anti virus, application security
    
By: Bit9     Published Date: Jan 06, 2015

Nuisance malware can damage productivity and consume IT time, but advanced threats can cripple a company. As advanced attacks increase in both sophistication and quantity, the potential risk and damage they pose to organizations has increased exponentially. While antivirus (AV) serves a role in mitigating nuisance malware, it does not stop advanced threats and it should not be a top endpoint security investment in 2015. Are you still paying for antivirus?

Tags : antivirus, advanced threats, antivirus solutions, security investments, security, it management, knowledge management, enterprise applications
    
By: Cisco     Published Date: Jan 06, 2015

Discover how a comprehensive, network-enabled approach to information security can help protect you against today's increasingly pervasive cyberthreats by giving you unprecedented visibility across your entire network.

Tags : engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, networking
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

As business becomes more connected and as data moves further outside the organizational walls, the supply chain has become a critical chink in the security armor. This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Tags : small business backdoors, supply chain, secuirty armor, security
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper explores the good, bad and ugly of big data in cybersecurity and provides tips for understanding cyber risk in complete business context that includes your industry sector, infrastructure, company size, supply chain, location, your online presence, and many more factors.

Tags : big data, cybersecurity, industry sector, infrastructure, online presence, security
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Tags : cybersecurity, business decision-makers, cyber risk framework, security
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

Tags : cyber insurance, cybercrime, business risk, cyber insurance, security, business activity monitoring
    
By: Cisco     Published Date: Jan 06, 2015

The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments.

Tags : engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, security
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.