Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3237Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.

Tags : esg, esg lab, firewall evaluation, firewall lab report, firewall test, next generation firewall, mcafee ngfw, security
    
By: McAfee     Published Date: Aug 14, 2014

The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.

Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, identity management, network security appliance
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, enterprise applications, web service security, mobile computing
    
By: VSS Monitoring     Published Date: Aug 11, 2014

Read this case study and learn how a full-service bank secured thousands of customer accounts with VSS Using VSS Protector Series, the financial institution: • Optimizes monitoring at all choke points throughout its 19 regional offices • Protects its network from external cyber threats & internal data leakage • Enables 100% network visibility & coverage for security & monitoring tools • Meets new high regulatory standards • Enhances legacy security devices while maximizing tool utilization & ROI • Increases reliability, with uptime meeting the five nines & achieves low latency • Reduces capital & operational expenditure • Directs traffic to multiple security tools, without creating daisy chain • Lays a foundation for plug-and-play expansion

Tags : vss monitoring, financial services provider, security, roi, banking, customer service
    
By: Qualys     Published Date: Aug 08, 2014

Get all the Facts and See How to Implement a Successful Vulnerability Management Program

Tags : management implementation, network security, solutions, key resources, security
    
By: HP     Published Date: Aug 08, 2014

Although modern backup solutions can offer significant recovery agility, backup as an IT process is generally less than “enough” for the data protection goals that IT is being asked to deliver. As IT is embracing snapshots, replication, archiving, and availability mechanisms to enhance business continuity/disaster recovery (BC/DR) preparedness, it is important to realize that there is a better way than piecemealing each component, and then wondering why CapEx and OpEx are so out of line.

Tags : vendor, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management
    
By: Qualys     Published Date: Aug 08, 2014

An Introduction to Defending Your Business Against Today’s Most Common Cyber Attacks

Tags : cyber attacks, defense, web application, business data, application security, anti spyware, anti virus, internet security
    
By: IBM     Published Date: Aug 08, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
By: Bit9     Published Date: Aug 06, 2014

Download this new white paper to learn: • How compliance and security gaps can affect your organization • How a positive solution can close these gaps to ensure the security of servers and endpoints and compliance with industry regulations • How Bit9 manages five core compliance controls that apply to PCI-DSS compliance

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

This eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other personally identifiable information for hundreds of millions of consumers in the process, data security has become priority No. 1 for many retailers in 2014. And for good reason: The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few. With retailers recently testifying before Congress that they’re facing increasingly sophisticated threats from cyber criminals, and no end to those in sight, it’s become apparent that your company needs to implement strategies that will protect itself from a costly data breach. Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance (all of these tips fall within one of five buckets — visibility; asset control; enforcement; trust policy; advance measurement.)

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: IBM     Published Date: Aug 06, 2014

Download here to learn how security and business continuity can shape the reputation and value of your company.

Tags : ibm, insurance, reputational risk, security
    
By: IBM     Published Date: Aug 06, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : ibm, banking, business, fraud-prevention, fraud, technology, security
    
By: IBM     Published Date: Aug 06, 2014

Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.

Tags : ibm, banking, cybercrime, prevention, solution, fraud, security
    
By: EMC Corporation     Published Date: Aug 05, 2014

Security operations centers need advanced analytical tools that can quickly collect and shift through security data. This brief looks at the latest options and processes to speed up detection of advanced threats.

Tags : security, analytics, threats, security operations centers, security data, advanced threats, speeding up threat detection
    
By: EMC Corporation     Published Date: Aug 05, 2014

It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
By: EMC Corporation     Published Date: Aug 05, 2014

Roland Cloutier, CISO of ADP, describes how the largest single payer in the US tax system leverages RSA Security Analytics as the foundation of their Trusted Platform Security Initiative.

Tags : case study, adp, best practices, security analytics, rsa, trusted platform security initiative, security, security management
    
By: EMC Corporation     Published Date: Aug 05, 2014

Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
By: EMC Corporation     Published Date: Aug 05, 2014

To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.