Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 3100Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jun 12, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : cisco web security, malware, high risk sites, anti spam, anti spyware, anti virus, email security, internet security
    
By: Cisco     Published Date: Jun 12, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: Cisco     Published Date: Jun 12, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, cisco, email security, threat detection network, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 12, 2014

How Cisco® Web Security enables better data and brand protection for today’s enterprises.

Tags : web security, cisco, brand protection, security, internet security, intrusion detection, intrusion prevention, web service security
    
By: Symantec     Published Date: Jun 10, 2014

This Lab Validation report from ESG provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and operational costs. Find out how Symantec Backup Exec 2014 measures up against best practices in virtual data protection. Download Now.

Tags : symantec, esg, virtual machine back up, lab validation, protection, data availability, storage, operational costs
    
By: Dropbox for Business     Published Date: Jun 09, 2014

“Security” is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure.1 But the truth is, cloud solutions can offer companies real, tangible security advantages. Before you assume that on-site is the only way to keep data safe, it’s worth taking a comprehensive approach to evaluating risks. Doing so can lead to big benefits.

Tags : dropbox, cloud, security, business, risk, secure, data management, data center
    
By: Dropbox for Business     Published Date: Jun 09, 2014

File sync and share can increase productivity, but how do you pick a solution that works for you? There will likely be a number of factors guiding your decision, and if you’re like most businesses, security is high on the list. Download to learn some important questions to ask file sync and share vendors about security.

Tags : dropbox, file sync, sync, share, productivity, share vendors, security, data management
    
By: Dropbox for Business     Published Date: Jun 09, 2014

Losing data is costly. According to the Ponemon Institute, the average data breach costs US organizations an estimated $200 per record, or $5.4 million total per breach. And apparently these breaches are equally likely to be from criminal attack as from employee or contractor negligence. It makes sense then that surveys point to data loss via unsecured file sync and share solutions as one of IT’s biggest concerns. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?

Tags : dropbox, data, workplace, breach, security, data management, data center
    
By: Dropbox for Business     Published Date: Jun 09, 2014

Protecting your data isn’t a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we’ve designed the product itself. Download here to find out how we’ve built Dropbox for Business to keep data safe for all our users.

Tags : dropbox, business, data, protect, security, data management, data center
    
By: Palo Alto     Published Date: Jun 09, 2014

This paper discusses the need for and details of a Zero Trust approach to network security. It also itemizes the essential criteria and capabilities required of a Zero Trust solution, explains how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust design.

Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
By: Palo Alto     Published Date: Jun 09, 2014

The Modern Malware Review presents an analysis of 3 months of malware data derived from more than 1,000 live customer networks using WildFire™ (Palo Alto Networks™ feature for detecting and blocking new and unknown malware). The review focuses on malware samples that were initially undetected by industry-leading antivirus products.

Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
By: Palo Alto     Published Date: Jun 09, 2014

Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.

Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
By: Palo Alto     Published Date: Jun 09, 2014

Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.

Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
By: Palo Alto     Published Date: Jun 09, 2014

This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
By: EMC Corporation     Published Date: May 27, 2014

ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.

Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
By: EMC Corporation     Published Date: May 27, 2014

The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.

Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
By: EMC Corporation     Published Date: May 27, 2014

RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.

Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
By: EMC Corporation     Published Date: May 27, 2014

RSA Paper: In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain. This RSA Security Brief looks at the areas for improvement where investment will typically generate the greatest security benefit.

Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
By: EMC Corporation     Published Date: May 27, 2014

RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.

Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: VSS Monitoring     Published Date: May 21, 2014

Learn about how to optimize your networking monitoring for real-world threats and see what your network and security team need to do to stay on top of the game.

Tags : vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, networking
    
By: VSS Monitoring     Published Date: May 21, 2014

Learn how your organization can properly support packet decryption for security scanning and see how this can protect you from advanced threats and other malicious programs.

Tags : vss monitoring, decryption, security scanning, security, threats, protection, attacks, intrusions
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: CEB     Published Date: May 19, 2014

This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.

Tags : ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
    
By: Entrust     Published Date: May 15, 2014

Certificate Discovery & Management Solution

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.