Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3099Sort Results By: Published Date | Title | Company Name
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
By: Websense     Published Date: Jul 08, 2014

This paper provides 5 essentials for protecting against advanced persistent threats (APTS)

Tags : apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: HP     Published Date: Jul 03, 2014

A Viewpoint paper on how managed cloud-based options balance control with flexibility and scale.

Tags : enterprise mobility, security and governance, cloud-based mobility services, web service security, mobile computing, mobile data systems, mobile workers, vulnerability management
    
By: Network Instruments     Published Date: Jun 30, 2014

News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.

Tags : network instruments, hacks, apm, security, pci, dss, hackers, database security
    
By: Delphix     Published Date: Jun 27, 2014

Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.

Tags : data security, masking products, agile masking, solution, creation, delivery, security, it management
    
By: IBM     Published Date: Jun 26, 2014

Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!

Tags : ibm, security, cyber security, cybercrime, cybercriminals, malware, network security, it management
    
By: IBM     Published Date: Jun 26, 2014

Achieve more stable, effective and manageable endpoint security with Stateful Application Control.

Tags : ibm, security, cyber security, cybercrime, cybercriminals, malware, network security
    
By: Cyveillance     Published Date: Jun 20, 2014

Learn about the recent trends and the 2014 outlook for the information security threat landscape. Find out how your organization can better prepare to prevent malicious attacks that could disrupt your business.

Tags : cyveillance, security, attacks, security threats, cybercriminals
    
By: Cyveillance     Published Date: Jun 20, 2014

Learn about the true cost dynamics behind Phishing attacks and see what your organization could do to better prepare against these increasingly complex threats.

Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
By: Cyveillance     Published Date: Jun 20, 2014

Learn how cyber criminals are adapting to the newest mobile technologies, and how they have figured out how to create “rogue” applications that leverage a brand’s logo, slogan, or other intellectual property to commit fraud, theft or other crime.

Tags : cyveillance, mobile apps, cyber security, mobile security, cyber criminals, security
    
By: Cyveillance     Published Date: Jun 20, 2014

Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.

Tags : cyveillance, mobile security, cyberattacks, threats, malicious attacks, security
    
By: Acxiom Corporation     Published Date: Jun 20, 2014

Consumers demand – no, expect – marketers to deliver highly relevant communications. Yet, daily headlines about security and privacy keep them on guard about use of their personal information. How do you reconcile the personalization privacy paradox? Guest speaker, Forrester Research, Inc.’s Fatemeh Khatibloo and Bryan Throckmorton of Acxiom will offer fresh findings on customer expectations regarding privacy and examples of how companies are building transparency and trust – and differentiating themselves – with preference centers that put more control in the hands of customers.

Tags : acxiom, forrester research, privacy, personalization, personal information, marketing, personalization privacy, identity management
    
By: CA arcserve     Published Date: Jun 11, 2014

Is it the end of data protection as we know it? Download this whitepaper to learn how to define a next generation architecture.

Tags : ca arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
    
By: CA arcserve     Published Date: Jun 11, 2014

Virtualization has without doubt enabled IT organizations to obtain maximum efficiency from their physical hardware, but virtualization has also increased the complexity these organizations have to manage, and that includes data protection. This paper discusses some of the hidden complexities virtualization introduces to backup and recovery requirements, and the challenges created when backup involves a combination of physical servers and virtual machines. It also discusses ways that backup and recovery processes can be simplified by avoiding point solutions.

Tags : ca arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
    
By: McAfee     Published Date: Jun 04, 2014

El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.

Tags : firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw
    
By: Global Knowledge     Published Date: Jun 02, 2014

Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data flow is preserved.

Tags : global knowledge, pki, secure, data, data flow, security, data management
    
By: DocuSign     Published Date: May 29, 2014

Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.

Tags : docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions, enterprise applications
    
By: McAfee     Published Date: May 22, 2014

Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet

Tags : vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad
    
By: CenturyLink Technology Solutions     Published Date: May 22, 2014

Read “Linedata Launches SaaS-Based Offering and Expands Global Reach with Markets Infrastructure” now, and learn how Linedata partnered with CenturyLink to expand its product offerings and achieve a global presence.

Tags : centurylink, agile it, it infrastructure, network infrastructure, data center, networking, infrastructure, network architecture
    
By: CenturyLink Technology Solutions     Published Date: May 22, 2014

Read “CenturyLink races ahead of competition with hybrid solution for Cancer Research UK” now, and see how hybrid IT solutions can speed you forward and increase efficiencies.

Tags : centurylink, cloud computing, hybrid cloud, disaster recovery, agile infrastructure, infrastructure, network architecture, backup and recovery
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: McAfee     Published Date: May 19, 2014

A medida que la tecnología de firewall de próxima generación (NGFW - next-generation firewall) se convierte en más convencional, es el momento de revisar las capacidades y funciones avanzadas que separan a los líderes de los rezagados. En su forma más básica, el consenso de una definición de NGFW incluiría estas capacidades: funciones estándares de firewall como la inspección de estado y la traducción de direcciones de red, prevención de intrusiones integrada, control de aplicaciones y un cierto nivel de inteligencia e integración con bases de datos de vulnerabilidad y reputación.

Tags : firewall de próxima generación, sistemas de prevención de intrusos, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.