Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 201 - 225 of 3919Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: May 15, 2015

Intel Security offers solutions to meet each need. Download this quick guide and learn your options.

Tags : windows 2003 eos, end of support for windows, windows security challenges, security
    
By: Aerohive     Published Date: May 14, 2015

This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.

Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security, gigabit networking, network management, network performance
    
By: Aerohive     Published Date: May 14, 2015

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, virtualization, cloud computing
    
By: Aerohive     Published Date: May 14, 2015

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : internetworking hardware, network architecture, network management, network performance, network provisioning, network security, mobile computing, mobile data systems
    
By: IBM     Published Date: May 12, 2015

The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.

Tags : ibm, healthcare, security, data, cybercrime, encryption, firewalls, hacker detection
    
By: IBM     Published Date: May 12, 2015

This white paper describes a holistic approach to healthcare cybersecurity, which incorporates sophisticated big data analytics to help better protect and secure the vast array of data healthcare organizations maintain.

Tags : healthcare, cybersecurity, big data, security, security management, quality assurance, data quality, database security
    
By: IBM     Published Date: May 07, 2015

Learn how to build a proactive threat and fraud strategy based on business analytics. You’ll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.

Tags : business analytics, risk management, threat management, fraud, proactive threat, analytics solutions, reduce exposure, reduce threats
    
By: CenturyLink     Published Date: May 06, 2015

Download Seven Secrets to High Availability in the Cloud. High Availability (HA) is about designing systems and applications that deliver superior uptime and service. Hybrid IT presents new challenges for system managers, developers and architects, who must ensure HA while taking advantage of the flexibility available from architectures combining on-premises data centers, and public and private clouds. This must-read best practices guide shares seven secrets of high availability in the cloud.

Tags : cloud, high availability, designing systems and applications, uptime and service, hybrid it, on-premise data center, public and private clouds, security
    
By: Acquia     Published Date: Apr 16, 2015

Can you build an invincible Drupal site? The easy answer is no, but you have a few ways to prepare and secure your site to withstand any sort of vulnerability or traffic spike.

Tags : cloud security, security management, drupal site, protection, security, build an invincible drupal site, security, build secure drupal site
    
By: Bit9     Published Date: Apr 16, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced threat hunting, traditional detection, endpoint data collection, threat intelligence, threat detection, access control, firewalls, hacker detection
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.

Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: Bit9     Published Date: Apr 16, 2015

You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise.

Tags : data breach, breach preparation, cyber attack, data security, threat detection, security, application security, hacker detection
    
By: destinationCRM.com     Published Date: Apr 15, 2015

It's no secret that the use smart phones is exploding. According to a recent report from the Pew Research Center, 34% Americans go online mostly using their phones, and not using some other device such as a desktop or laptop computer. The implication for location based marketing and ecommerce, customer service, and personalized, permission based marketing is enormous, but the rules of engagement are markedly different for mobile communications.

Tags : mobile data, customer engagement, crm, customer data, smartphones, mobile communications, mobile data systems, smart phones
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Get the latest mobile devices and apps in the handsof learners and educators quickly and securely with mobile device and app management.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: IBM     Published Date: Apr 15, 2015

With IBM MobileFirst and IBM’s Smarter Process, you can redesign how you deliver services and support more streamlined business processes. Therefore, you can help enable your customers to have a more superior mobile experience.

Tags : ibm, mobile computing, customer satisfaction, mobile experience, optimization, customer centric, mobile data systems, mobile workers
    
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.