Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3341Sort Results By: Published Date | Title | Company Name
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, mobile data systems, mobile workers, cloud computing, virtualization, infrastructure
    
By: Aerohive     Published Date: Oct 14, 2014

This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.

Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security, gigabit networking, network management, network performance
    
By: IBM     Published Date: Oct 14, 2014

Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

Tags : ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
By: IBM     Published Date: Oct 14, 2014

Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.

Tags : it security breach, csirp, cyber threats, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.

Tags : security operations, deployment, service delivery, problem management, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, it security, resilience investments, enhanced brand value, security, it management, best practices, business intelligence
    
By: Dell     Published Date: Oct 14, 2014

In this webinar, a panel of experts will examine infrastructure security needs. The discussion will provide a framework for addressing the data protection and privacy gaps and include metrics that can help businesses benchmark the success of their investments. The webinar will also present real-world case studies and cloud data protection best practices.

Tags : dell, dell security, security, data protection, privacy, cloud security, cloud computing, network security
    
By: Centrify Corporation     Published Date: Oct 13, 2014

The amount of apps, passwords, and identities that your employees need to manage every day can really stunt productivity. IT doesn’t like it either. After all, they’re just trying to ensure the security of your enterprise but they’re often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employee have work to do, and they’re suffering from password fatigue, they resort to using passwords that circumvent security practices—inviting hackers into your enterprise data. Solutions to solve the problem are often cumbersome making a complicated problem…well, more complicated.

Tags : service solution, it productivity, idaas, security practices, password fatigue, enterprise security, security
    
By: CenturyLink     Published Date: Oct 10, 2014

Doing Big Data and NoSQL in the public cloud sounds great, but at some point, someone has to write a check to make it happen. Is there a strong financial argument for making this move? Can you start small and grow larger easily? This paper answers this question with a detailed Total Cost of Ownership (TCO) analysis for open source data management in the public cloud. Contrasting cloud deployments on the standard vs hyperscale CenturyLink Cloud stack Powered by Intel Cloud Technology, versus the on-premise analogue, the paper models the relative financial merits of each approach. The paper considers the best potential use cases for on-premise versus cloud and walks through an example use case to show the impact to business outcomes (time to results, cost, TCO). Cost factors compared include:

Tags : total cost ownership, big data, public cloud, security, protection, administrative personnel, data management, data center
    
By: ForgeRock     Published Date: Oct 08, 2014

Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.

Tags : identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services, security, enterprise applications
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Thawte     Published Date: Oct 06, 2014

Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.

Tags : network security, encryption, internet security, ssl
    
By: Thawte     Published Date: Oct 06, 2014

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : internet security, ssl, customer satisfaction
    
By: Thawte     Published Date: Oct 06, 2014

A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.

Tags : ssl certificates, application, web server, sensitive information, customer confidence, ssl
    
By: Thawte     Published Date: Oct 06, 2014

In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.

Tags : apache web server, digital certificate, ssl certificate, benefits, ssl
    
By: Thawte     Published Date: Oct 06, 2014

Why Self-Signed Certificates are Much Costlier-and Riskier- Than Working with a Trusted Security Vendor.

Tags : ssl certificates, self-signed, trusted security vendor, hidden costs, ssl
    
By: Thawte     Published Date: Oct 06, 2014

Leveraging Multi-Use Digital Certificates to Simplify Certificate Management and Reduce Costs.

Tags : san, ssl certificates, management, reduce costs, multi-use, ssl
    
By: Workday     Published Date: Oct 06, 2014

Définition du véritable SaaS et des bénéfices pour votre entreprise

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, storage, web service security, mobile data systems
    
By: Workday     Published Date: Oct 06, 2014

Comment reconnaître les applications et fournisseurs de solutions Cloud efficaces

Tags : the cloud, cloud providers, cloud computing, modern saas, mobile computing, mobile data systems, virtualization, mobile device management
    
By: Damballa     Published Date: Oct 03, 2014

Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty

Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
    
By: Damballa     Published Date: Oct 03, 2014

The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence

Tags : damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
By: Damballa     Published Date: Oct 03, 2014

Damballa’s Q2 2014 “State of Infections” report discussed the state of the enterprise under attack and trends in threats seen in the second quarter of 2014. Key findings include: • The rise of ransomware • The relationship between the size of an enterprise and its infection rate.

Tags : damballa, state of infection, enterprise, attacks, reduce risk, infection rate, security
    
By: Damballa     Published Date: Oct 03, 2014

In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised. • Eight detection engines produce fidelity in True Positives • Risk engines priorities response to infections that matter most

Tags : damballa, advanced threats, failsafe, true positives, risk engines, infections, security
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.