Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 4056Sort Results By: Published Date | Title | Company Name
By: Riverbed     Published Date: Jun 02, 2015

The transition to a hybrid environment has created challenges in optimizing application performance because the primary compute location has shifted and become distributed. Learn to ease these challenges adapt to transitions.

Tags : hybrid network, cloud infrastructure, increase reliability, reduce costs, hybrid networking, infrastructure, migration, network performance management
    
By: Aerohive     Published Date: Jun 01, 2015

Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Iron Mountain     Published Date: Jun 01, 2015

Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.

Tags : storage management, web service security, business management, collaboration, content delivery, document management, records management, desktop management
    
By: Arcserve     Published Date: May 29, 2015

In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!

Tags : data protection appliances, appliance adoption, arcserve, security, it management, knowledge management, data management
    
By: Riverbed     Published Date: May 29, 2015

Embrace zero branch IT for greater data protection, better agility, maximum business continuity, optional performance, and lower TCO.

Tags : data protection, business continuity, performance, growth, infrastructure, data center, data quality, productivity
    
By: Riverbed     Published Date: May 29, 2015

EARTHQUAKE PROMPTS MANUFACTURING COMPANY TO PROTECT ITS BUSINESS WITH RIVERBED STEELFUSION

Tags : data, infrastructure, applications, data security, business continuity, analytical applications, business intelligence, data quality
    
By: Equinix     Published Date: May 28, 2015

This infographic provides information on how Performance Hub is designed to improve the performance of your entire network while simplifying your infrastructure and lowering your Total Cost of Ownership.

Tags : equinix performance hub, networks, data growth, network architecture, connectivity, network services, cloud, devices
    
By: Box     Published Date: May 28, 2015

This report illustrates how you can fast track your mobile and external collaboration initiatives.

Tags : sync, efss, mobility, track your mobile, security, cloud, hybrid, storage
    
By: Aruba Networks     Published Date: May 27, 2015

Aruba Networks global security study, reveals that businesses are ill prepared for the new #GenMobile workforce; highlighting some alarming findings directly linked to user demographics, industry & geography. Download the report to determine best practices and your security risk.

Tags : global security, #genmobile workforce, user demographics, security risk, security
    
By: Aruba Networks     Published Date: May 27, 2015

The Internet of Things (IoT) is comprised of stationary and mobile devices and machines that we use to shape, harness, control, explore, and share the world around us. But how can you ensure that the decision making and business intelligence is secure and trusted? Download our IoT White Paper.

Tags : iot, stationary and mobile devices, business intelligence, trust-based internet, business-critical applications, security
    
By: Mimecast     Published Date: May 27, 2015

White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.

Tags : mimecast, migration, microsoft office 365, storage, cloud backup, security, it management, data protection
    
By: ThreatTrack Security     Published Date: May 26, 2015

Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”

Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.

Tags : phishing, next-generation malware, security, email, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.

Tags : cyberthreat, security, malware, defense, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.

Tags : advanced protection, cyberthreat, security, incident response team, threatsecure, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this white paper to learn how to add value through malware analysis.

Tags : malware, security threat, cyberattack, cyberthreat, malware analysis, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.

Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar to learn how to win the battle against Advanced Persistent Threats.

Tags : persistent threats, cyberattacks, security, data breach, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.

Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.

Tags : threattrack, cyber security, attacks, protection, security
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks

Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
By: Acronis EMEA     Published Date: May 21, 2015

This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.

Tags : data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security
    
By: Acronis EMEA     Published Date: May 19, 2015

Download this paper to uncover the steps needed to mobilise your workforce and become more productive.

Tags : mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access
    
By: Acronis EMEA     Published Date: May 19, 2015

This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.

Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
    
By: Acronis EMEA     Published Date: May 19, 2015

The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.

Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.