Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 3814Sort Results By: Published Date | Title | Company Name
By: Code42     Published Date: Mar 31, 2015

There’s no doubt consumer-grade sync and share solutions are convenient, but it’s the risk they introduce to the enterprise that keeps IT leaders up at night. And it’s not without a price: unintentional data compromises cause financial hardship—nearly $2 billion, according to the harmon.ie study—and reputational damage for businesses and their customers. Luckily, there is such a thing as “enterprise-grade” sync and share, meeting IT teams’ needs for solutions that combine corporate-level security and management capabilities with the ease-of-use employees demand. But what really constitutes an enterprise-grade sync and share solution? To get a second glance from enterprise IT, sync and share solutions must, at a minimum, include the basic business feature sets: security, integrations, roles and permissions, audit trails, remote wipe, comprehensive APIs, real-time administration, bandwidth controls and de-duplication.

Tags : sync, fss, file share, data compromises, integrations, bandwith controls, security, networking
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper will help you choose the right cloud provider, optimise your security and deploy the solution.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, application security, security management, business management
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This white paper reveals a list of top 10 trends in cloud computing to help you take advantage of all the greatest new innovations in cloud technology.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud computing trends, cloud security
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper will help you to understand the importance of creating a DRP for your company. This is a critical step in preparing for disaster, improving employee response, reducing downtime, and quickly returning to normalcy.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, write a drp, steps to write a formal drp, backup and recovery
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper illustrates the difference between the two and what each can do to prepare companies for disaster.

Tags : disaster recovery, risk reduction, causes of disasters, how to avoid disasters, protect your business from disasters, test and measurement, backup and recovery, security management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.

Tags : endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.

Tags : endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.

Tags : endpoint security, security policy, mobile devices, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.

Tags : cloud, date security, cloud security, virtualization, security, networking, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.

Tags : security, software development, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.

Tags : cloud security, virtualization security, virtualization, data center, security, it management, wireless, knowledge management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.

Tags : cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands— while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.

Tags : security, virtualization, cloud computing, trend micro, it management, wireless
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.

Tags : user protection, security, cloud, endpoint, application, network, networking, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.

Tags : custom defense, security threats, enterprise networks, intellectual property, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro

Tags : security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro

Tags : networking, security, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro

Tags : trend micro, targeted attacks, security solutions, technology, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro

Tags : mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security
    
By: CDW-Trend Micro     Published Date: Mar 26, 2015

A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro

Tags : security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management
    
By: Waratek     Published Date: Mar 23, 2015

Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.

Tags : application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching
    
By: Arbor Networks     Published Date: Mar 23, 2015

After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.

Tags : arbor networks, arbor, ddos, denial of service, denial of service attacks, network security, network overload, internet security
    
By: IBM     Published Date: Mar 18, 2015

Download this leading-edge research today to learn about the critical business and performance metrics that can be used to assist an organization in choosing the optimal security platform.

Tags : security, platform security, cyber criminal, security software, security appliances, cloud architecture, electronic exposure, business models
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.