Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3453Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Dec 04, 2014

The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.

Tags : spoofing, phishing, identity theft, lax website, cybercrime, norton, security
    
By: Symantec     Published Date: Dec 04, 2014

With 93% of people doing at least some of their holiday-season shopping with online merchants, e-tailers of every kind need to get their websites in gear and ensure their customers feel confident shopping on their site. Whether it’s shopping online, in store pick-up, or even browsing and wish lists, customers are offering you an unprecedented amount of data and sales this season. But fail to keep your customers safe with good website security, and all you’ll get is a lump of coal in your stocking.

Tags : online merchants, e-tailers, holiday, holiday season, website security, shopping, security
    
By: Onapsis     Published Date: Nov 24, 2014

Business-critical platforms such as SAP and Oracle have been in place for more than a decade, however a majority of firms using these applications currently have gaps in their security program. There are many reasons for these security gaps ranging from a reliance on generic security tools, to IT teams lacking complete understanding of how application platforms work. Securing Enterprise Applications, takes a focused look at the major facets in an enterprise application security program, and makes practical suggestions on how to improve efficiency and effectiveness of an organizations security program. This research paper discusses specific security and compliance use cases for large enterprise applications, highlight gaps, and explain some application-specific tools to address these issues. Securing Enterprise Applications spotlights common deficiencies with the core pillars of security controls and products.

Tags : platform security, application platforms, it security tools, enterprise application security, security, it management, knowledge management, enterprise applications
    
By: Onapsis     Published Date: Nov 19, 2014

Join Analyst & CTO of Securosis, Adrian Lane, and Julie Ford, SAP Security & Cybersecurity Subject Matter Expert for Broadhawk Consulting, for the archived presentation of “State of Enterprise Application Security.” During this presentation they covered current security challenges facing the SAP landscape, the need for business-critical application security, and what can be done to effectively secure SAP systems. This “no fluff” webcast will provided real-world views and discussions around SAP security challenges facing your organization and the best approach on how to build an enterprise application security program.

Tags : onapsis, security, enterprise application security, sap
    
By: IBM     Published Date: Nov 19, 2014

IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.

Tags : ibm, bluemix, cloud-computing, middleware, networking, security, software development, it management
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: General: Partially cloudy: the benefits of hybrid deployment models

Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
By: Actiance, Inc.     Published Date: Nov 13, 2014

The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!

Tags : actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
    
By: CA Technologies     Published Date: Nov 07, 2014

Une solution IAM hybride permet aux organisations de migrer vers le Cloud au rythme qui correspond à leurs exigences de réduction des coûts opérationnels et d’améliorer leur agilité.

Tags : ca technologies, migrer vers le cloud, cloud computing, iam hybride permet, identity management, mobile computing, infrastructure
    
By: IBM     Published Date: Nov 05, 2014

IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

Tags : ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
By: IBM     Published Date: Nov 05, 2014

This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: IBM     Published Date: Nov 05, 2014

A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.

Tags : ibm, cyber security, risk management, business threats, security framework, business protection, cyber protection, security framework
    
By: Cyveillance     Published Date: Oct 30, 2014

Unlike many traditional network-defense and cybersecurity providers, Cyveillance looks for warnings and indicators of potential risks outside the network perimeter. We consider the different ways the Internet, particularly the web and social media, can impact security: not just IT security, but business operations, and even physical security. In this whitepaper, we discuss how to incorporate threat intelligence into your physical security program to better safeguard your employees, executives, and physical assets.

Tags : security, plan, intelligence, protecting, information, intellectual property, infrastructure, employees
    
By: Cyveillance     Published Date: Oct 30, 2014

Protecting a business — including its information and intellectual property, physical infrastructure, employees, and reputation — has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. In this whitepaper, we discuss how to develop a pragmatic, measured plan to incorporate threat intelligence into your security program to better safeguard your business.

Tags : security, plan, intelligence, protecting, information, intellectual property, infrastructure, employees
    
By: IBM     Published Date: Oct 22, 2014

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

Tags : data classification, data discovery, defining data, data identity, security, it management, data management
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers
    
By: Onapsis     Published Date: Oct 21, 2014

NVIDIA is a US-headquartered global technology company best known as a manufacturer of graphics and is now able to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.

Tags : onapsis, security, security technology, sap systems, threat protection, audit scans, monitoring, detection
    
By: Onapsis     Published Date: Oct 21, 2014

Westinghouse Electric Company, Multi-national Nuclear Power Company, was able to put in place a holistic SAP security management process, and to raise their SAP environment security level by automatically and periodically monitoring the platform for new threats.

Tags : onapsis, security, security technology, sap systems, sap environment, sap platform, monitoring, threat protection
    
By: Lumension     Published Date: Oct 20, 2014

Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Lumension     Published Date: Oct 20, 2014

"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli

Tags : java, insecurity, vulverabilities, computing, security
    
By: Lumension     Published Date: Oct 20, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: Dyn     Published Date: Oct 16, 2014

Web presence is now a required option for customers accessing a business’s products and services. But more than just an option, web pages have become the face of most companies to the public. Learn how can you take control of the Internet effect on your company’s web presence through Internet monitoring, analysis and planning.

Tags : dyn, internet visibility, web infrastructure, web presense, customer service, online business, internet performance, network performance
    
By: Oracle     Published Date: Sep 30, 2014

Measure your content marketing effectiveness and value by following these five steps, brought to you by the Oracle Marketing Cloud.

Tags : personalize, engagement, advocacy, revenue, marketing, cloud, oracle, identity management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.