Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3824Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 09, 2015

The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.

Tags : ibm, it security, vulnerability management, virus protection, spyware protection, firewalls, hacker detection, internet security
By: IBM     Published Date: Apr 09, 2015

Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

Tags : malware protection, ibm, network security, it security, application security, internet security, intrusion detection, intrusion prevention
By: IBM     Published Date: Apr 09, 2015

How can you get actionable insight from user feedback to develop mobile apps that engage users and deliver what matters to them? The answer lies in cloud-based services that enable rapid collection and analysis of user feedback combined with automation enabling faster response.

Tags : application integration, mobile apps, coding, cloud-based services, cloud computing, automation, user feedback, mobile computing
By: VMware, Inc.     Published Date: Apr 08, 2015

Wish you could get to hybrid cloud—fast?More than 30% of organizations expect that within three years, they’ll access 45.5% of IT resources through some form of cloud—public, private, or hybrid.* That’s an impressive number, and there’s a reason for it: the cloud is packed with benefits. If you’re a VMware customer, you’re already halfway there. vCloud Air is built on the trusted VMware vSphere® platform, so it’s simply an extension of your current data center.

Tags : vmware, hybrid cloud, cloud computing, data center, virtual network, web service security, data integration, database security
By: IBM     Published Date: Apr 06, 2015

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

Tags : data discovery, data classification, security, risk, ibm, it management, knowledge management, storage
By: IBM     Published Date: Apr 06, 2015

Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.

Tags : big data, analytics, unstructured content, enterprise information, ibm, security, it management, knowledge management
By: IBM     Published Date: Apr 06, 2015

With a data explosion upon us that shows no slowing in sight, information governance is no longer an option for corporations. IBM StoredIQ is an important first step toward getting data under control, lowering storage costs and mitigating risk.

Tags : information governance, ibm storediq, risk, storage, data management, security, it management, knowledge management
By: PulseSecure     Published Date: Apr 06, 2015

Learn about the 2015 mobile threat landscape and see how you can prepare your organization for 2015 and beyond with this market report.

Tags : mobile threats, pulsesecure, mobile security, mobile threat landscape, market report, security, it management, knowledge management
By: Symantec     Published Date: Apr 02, 2015

The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.

Tags : security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security, security
By: Symantec     Published Date: Apr 02, 2015

Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S

Tags : secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
By: Symantec     Published Date: Apr 02, 2015

Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.

Tags : online customer trust, sensitive data, data interception, malicious intent, security
By: Symantec     Published Date: Apr 02, 2015

The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?

Tags : heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
By: OpenText     Published Date: Apr 02, 2015

Enterprises of nearly all sizes and industries are undergoing significant changes in how, when, and where their employees work, largely due to both new technologies and the realities of global commerce and collaboration. Business leaders are pushing their IT departments to come up with new solutions to help their employees be more productive, while IT leaders strive to ensure that corporate systems are secure, available and delivering a superior user experience. Read this executive brief to learn more about remote access solutions.

Tags : remote access, unix, linux, user experience, networking, security, wireless, knowledge management
By: OpenText     Published Date: Apr 02, 2015

The most advanced UNIX desktop virtualization solution available, Exceed VA TurboX empowers a global workforce though remote application access and provides an optimal user experience that improves performance and productivity. Read this product overview to learn more about OpenText Exceed VA TurboX 10.5.

Tags : opentext exceed va turbox, remote access, productivity, resources, networking, security, it management, knowledge management
By: PulseSecure     Published Date: Apr 01, 2015

Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.

Tags : byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security
By: PulseSecure     Published Date: Apr 01, 2015

Learn how to transition enterprise customers safely to the cloud and see how this will enable service providers to deliver scalable and on-demand, cloud-based deployments with simplicity and agility.

Tags : cloud, pulse secure, security, wireless, mobile access, data center, it management, knowledge management
By: PulseSecure     Published Date: Apr 01, 2015

Learn how to properly empower your organization for mobile productivity and see how you can deploy and provision for this device-based access with improved security and management policies.

Tags : mobile productivity, mobile access, security, connectivity, byod, corporate network, networking, it management
By: PulseSecure     Published Date: Apr 01, 2015

Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.

Tags : mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker, networking
By: Bit9     Published Date: Mar 31, 2015

As countless retail organizations have fallen victim to POS-driven information security breaches targeting consumer payment card data, pressure on retail executives to take further action to protect POS devices has risen dramatically. Download the SANS Institute’s latest report on Point of Sale Security today!

Tags : pos, bit9, it security breaches, pos security, bit9, security, it management, knowledge management
By: Bit9     Published Date: Mar 31, 2015

Today’s PCI compliance landscape is one of continuing change and scrutiny. Given the number of recent high-profile breaches in the retail space, the pressures will only increase.

Tags : pci assessments, pci compliance, bit9, data security standards, security, it management, knowledge management, enterprise applications
By: Bit9     Published Date: Mar 31, 2015

Bit9’s approach to compliance is simple. Organizations should include relevant stakeholders in building Compliance Control Policies to meet regulatory standards while supporting business goals. Control Policies dictate which assets are covered by each Standard and what actions users can execute for each asset. By grouping similar classes of assets and users, policies can be logical to users, enforcement is automatic and audits are simplified.

Tags : it auditor, security controls, risk compliance, bit9, compliance control policies, security, it management, knowledge management
By: Bit9     Published Date: Mar 31, 2015

This eGuide will update you on the latest HIPAA changes impacting information security, and outlines practical steps you can take, starting today, to not only meet HIPAA’s compliance requirements but to also make tangible improvements to your information security program as a whole.

Tags : phi security, hipaa compliace, information security programs, bit9, hipaa risk, security, it management, knowledge management
By: Bit9     Published Date: Mar 31, 2015

POS devices have become a constant target for criminal hackers. Protecting your point-of-sale systems as well as cardholder data is becoming the most crucial element to securing your organization. This eBook will help you understand the history of POS technology and the advanced threats currently facing your environment.

Tags : pos, pos security, pos systems, pos technology, bit9, security, it management, knowledge management
By: CDW     Published Date: Mar 31, 2015

Organizations face a challenging deadline as the end of support for Windows Server 2003 nears, but they also have an opportunity for data center transformation. Download this infographic to learn more.

Tags : windows server 2003, microsoft, server migration, workloads, applications, security, it management, knowledge management
By: CDW     Published Date: Mar 31, 2015

The new IT conundrum is to decide to rent infrastructure or build out your data center. The data explosion of the past decade has left many enterprises awash in a mixed and disjointed storage environment. With different storage technologies for primary, backup and analytic storage pools and SSD options that can confound rather than help, many in IT are struggling to improve the efficiency, performance and cost structures of what has become a big part of IT's spend. Watch this webinar to learn more.

Tags : storage, cloud, infrastructure, data center, storage technologies, backup, security, it management
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.