Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3187Sort Results By: Published Date | Title | Company Name
By: Entrust     Published Date: Jul 21, 2014

The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.

Tags : identity guard, cloud services, secure, mobile devices, business efficiency, corporate networks, secure email, security
    
By: Entrust     Published Date: Jul 21, 2014

Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).

Tags : identity guard, cloud services, pki, secure, mobile identities, devices, security
    
By: Entrust     Published Date: Jul 21, 2014

The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.

Tags : device certificates, identity, authentication, mobile world, information technology, security
    
By: Entrust     Published Date: Jul 21, 2014

To help protect access to this sensitive information, a strict set of security controls is defined in the FBI’s CJIS Security Policy and must be adhered to by organizations that access CJIS information.

Tags : authentication, cjis, compliance, sensitive information, security, controls, fbi, policy
    
By: Entrust     Published Date: Jul 21, 2014

This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.

Tags : solution, infrastructure protection, avoid non-compliance, cyberattack, security
    
By: Entrust     Published Date: Jul 21, 2014

As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations.

Tags : authentication, healthcare, medicine, identity, security, cms system, information technology
    
By: Entrust     Published Date: Jul 21, 2014

Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly.

Tags : identity guard, cloud service, ssl, management, digital certification, multiple web servers, self-service, security
    
By: Entrust     Published Date: Jul 21, 2014

Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions.

Tags : ssl, digital certifications, discovery, management, solutions, ev multi-domain, security
    
By: Entrust     Published Date: Jul 21, 2014

Within the enterprise realm, two-factor authentication has become more than just an option — it’s now an indispensable asset.

Tags : mapping, two-factor authentication, indispensable asset, cybersphere, identities, sensitive information, security
    
By: Entrust     Published Date: Jul 21, 2014

Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach.

Tags : history, malware, cybercrime, global, attacks, virtual threat, defense, security
    
By: Entrust     Published Date: Jul 21, 2014

For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.

Tags : cjis, compliance solutions, security control, law enforcement, courts, public safety departments, software authentication, security
    
By: Entrust     Published Date: Jul 21, 2014

With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.

Tags : defending, enterprise, data security, protection, private identity, information transactions, trust, authentication
    
By: Entrust     Published Date: Jul 21, 2014

How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?

Tags : mobile, digital identity, platform, geographies, verticals, cultures, secure, desktop pc
    
By: Entrust     Published Date: Jul 21, 2014

Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities.

Tags : cybersecurity, small and medium businessess, technology, protect, smbs, security
    
By: Riverbed     Published Date: Jul 18, 2014

Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!

Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration, remote access, mobile computing, mobile workers
    
By: CA Technologies     Published Date: Jul 16, 2014

A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.

Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: Neustar     Published Date: Jul 14, 2014

More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more

Tags : neustar, ddos, cybercrimes, malware, botnets, stolen cards, smokescreens, underground economy
    
By: Neustar     Published Date: Jul 14, 2014

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Tags : neustar, blackbeard, pirate, siteprotect, cloud computing, ddos, it department, security
    
By: Neustar     Published Date: Jul 14, 2014

It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.

Tags : neustar, ddos, ecommerce, protection, security, malware, technology, it departments
    
By: Neustar     Published Date: Jul 14, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Tags : neustar, ddos, online gaming, ecommerce, protection, security, malware, technology
    
By: Symantec     Published Date: Jul 11, 2014

This Lab Validation report from ESG provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and operational costs. Find out how Symantec Backup Exec 2014 measures up against best practices in virtual data protection.

Tags : strategy, group, virtual machines, unified data, simple, physical and virtual landscapes, storage, protection
    
By: Symantec     Published Date: Jul 11, 2014

Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO's conquering these types of challenges? Find out how in this white paper by Expert, David Davis.

Tags : data, protection, physical and virtual environment, recovery, storage, consolidation, cio's, networking
    
By: Symantec Corporation     Published Date: Jul 11, 2014

View the SSL 101 video and discover how Symantec SSL Certificates help you protect your business and your customer’s confidential information from attack.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.