Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 3359Sort Results By: Published Date | Title | Company Name
By: Sourcefire, LLC     Published Date: Sep 30, 2014

Download this infographic today to gain a better understanding of integrated threat defense and the visibility to discover and protect against socially engineered exploits.

Tags : cisco, sourcefire, network security, integrated threat defense, big data analysis, real-time monitoring, security, business analytics
    
By: Sourcefire, LLC     Published Date: Sep 30, 2014

As threats continue to penetrate networks, organizations need to find new ways to defend against them. NSS Labs recently conducted the most rigorous next-generation firewall (NGFW) testing to date. Cisco ASA with FirePOWER Services excelled as compared to other tested products. Download this Data Sheet now to find out how Cisco ASA with FirePOWER Services excels in NSS Labs Testing.

Tags : cisco, sourcefire, network security, firewall security, next-generation firewall, ngfw, nss, nss labs
    
By: Sourcefire, LLC     Published Date: Sep 30, 2014

Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.

Tags : cisco, sourcefire, network security, threat centric, security model, cybercrime, full attack continuum, infrastructure
    
By: Oracle     Published Date: Sep 30, 2014

Measure your content marketing effectiveness and value by following these five steps, brought to you by the Oracle Marketing Cloud.

Tags : personalize, engagement, advocacy, revenue, marketing, cloud, oracle, identity management
    
By: Foxit     Published Date: Sep 18, 2014

IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?

Tags : foxit, document management strategy, revenue generated technology, storage, security, tight budgets, pdf solutions, enterprise applications
    
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: Arbor     Published Date: Sep 15, 2014

This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.

Tags : ddos attacks, it security, ddos mitigation, security, it management, business analytics
    
By: Arbor     Published Date: Sep 15, 2014

DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.

Tags : ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
By: Arbor     Published Date: Sep 15, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.

Tags : cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
By: Arbor     Published Date: Sep 15, 2014

Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar

Tags : security analytics, it security, cyber defenses, application security, firewalls, hacker detection, security management, secure content management
    
By: Cisco     Published Date: Sep 12, 2014

Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.

Tags : cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network
    
By: Cisco     Published Date: Sep 12, 2014

Adversaries spend 100 percent of their time finding weak links and using them to their advantage. And as the Internet of Things accelerates and our dependence on the connected environment continues to expand, so do opportunities for attackers. Download the Cisco 2014 Midyear Security Report to learn about the different types of vulnerabilities that exist in the systems we rely upon, including the Internet itself, and what can be done to reduce their number and impact.

Tags : adversaries, weak, link, internet, dependence, connected, environment, attackers
    
By: Cisco     Published Date: Sep 12, 2014

Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper

Tags : firewall, buying, next-generation, companies, midsize, strengthen, network, security
    
By: Bit9     Published Date: Sep 11, 2014

Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Sourcefire, LLC     Published Date: Sep 10, 2014

Maintaining a standard software configuration for all workstations across its organization has been a challenge for this large, multinational manufacturer, who runs each location as an independent unit. Recently, the company decided to launch a new security program to better protect its 16,000 workstations from malware infection. Since the existing endpoint protection software wasn’t offering enough information for security analysts to understand questionable events, as well as to distinguish routine activity from potential threats, the company’s security operations team chose to implement a new anti-malware solution. With the deployment of Sourcefire’s FireAMP, the company’s security analysts now have greater visibility into endpoint activity, and can quickly identify and contain suspicious events before workstations become infected. This has both increased employee productivity and has allowed the team to better protect critical corporate data.

Tags : cisco, sourcefire, network security, spot threats, fireamp, endpoint activity, malware, protection
    
By: HP     Published Date: Sep 08, 2014

Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect

Tags : servers, innovative, management, mobility, security, computational, technologies, mainframes
    
By: Riverbed     Published Date: Sep 05, 2014

This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.

Tags : cloud, enterprise storage, data protection, it requirements, metrics, security, data management
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.

Tags : sourcefire, network security, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.

Tags : sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity, breaches
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.

Tags : securosis, sourcefire, cisco, endpoint protection, server protection, attack protection, advanced attacks, security
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Making threat protection more intelligent and more accurate

Tags : network security, sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.

Tags : cisco, network security, sourcefire, security report, cyber attack, malware, outdated software, cybersecurity
    
By: CradlePoint     Published Date: Sep 04, 2014

Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.

Tags : security risks, crisis communications, security breaches, compromising customer data, security
    
By: Soonr     Published Date: Sep 03, 2014

Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.

Tags : soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr
    
By: Alert Logic     Published Date: Sep 03, 2014

As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.

Tags : alert logic, amazon web security solutions, aws business model, security
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.