Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3978Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 16, 2015

Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.

Tags : enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
    
By: IBM     Published Date: Jun 16, 2015

An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.

Tags : enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies
    
By: TigerText     Published Date: Jun 11, 2015

Download this guideline for reinforcing existing BYOD security practices and discover how mobile health can minimize expenses, improve patient care and boost staff productivity.

Tags : tigertext, mobile security, wireless security, mobile devices, mobile workers, byod, smart phones, data protection
    
By: Pluralsight     Published Date: Jun 10, 2015

OWASP Top 10 "The Big Picture" is all about understanding the top 10 web security risks we face on the web today in an easily consumable, well-structured fashion that aligns to the number one industry standard on the topic today.

Tags : web security risks, top 10 risks, security, top security risks, it management, internet security
    
By: AlienVault     Published Date: Jun 05, 2015

Practical security controls that won't break the bank

Tags : threat management, security, network, web application, network, application security, application integration, data protection
    
By: Verisign     Published Date: Jun 03, 2015

Defending an enterprise today is a more complex and challenging task than ever before. Download this white paper to learn what you need to know to protect your network and data.

Tags : point-of-scale systems, cyber crime, banking trojans, downloaders, hacktivist activity, security, crowdsourcing, networking
    
By: Verisign     Published Date: Jun 03, 2015

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services in the 1st Quarter of 2015. It represents a unique view into the attack trends unfolding online for the quarter, including attack statistics and behavioral trends.

Tags : ddos, attack mitigation, attack trends, attack statistics, behavioral trends, security, networking, it management
    
By: Iron Mountain     Published Date: Jun 01, 2015

Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.

Tags : storage management, web service security, business management, collaboration, content delivery, document management, records management, desktop management
    
By: Aruba Networks     Published Date: May 27, 2015

Aruba Networks global security study, reveals that businesses are ill prepared for the new #GenMobile workforce; highlighting some alarming findings directly linked to user demographics, industry & geography. Download the report to determine best practices and your security risk.

Tags : global security, #genmobile workforce, user demographics, security risk, security
    
By: Aruba Networks     Published Date: May 27, 2015

The Internet of Things (IoT) is comprised of stationary and mobile devices and machines that we use to shape, harness, control, explore, and share the world around us. But how can you ensure that the decision making and business intelligence is secure and trusted? Download our IoT White Paper.

Tags : iot, stationary and mobile devices, business intelligence, trust-based internet, business-critical applications, security
    
By: Mimecast     Published Date: May 27, 2015

White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.

Tags : mimecast, migration, microsoft office 365, storage, cloud backup, security, it management, data protection
    
By: IBM     Published Date: May 27, 2015

This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.

Tags : internet of things, product development, time to market, data analysis, networking, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 26, 2015

Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”

Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.

Tags : phishing, next-generation malware, security, email, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.

Tags : cyberthreat, security, malware, defense, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.

Tags : advanced protection, cyberthreat, security, incident response team, threatsecure, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this white paper to learn how to add value through malware analysis.

Tags : malware, security threat, cyberattack, cyberthreat, malware analysis, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.

Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar to learn how to win the battle against Advanced Persistent Threats.

Tags : persistent threats, cyberattacks, security, data breach, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.

Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.

Tags : threattrack, cyber security, attacks, protection, security
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks

Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
By: Verisign     Published Date: May 19, 2015

To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena™.

Tags : ddos mitigation platform, internet infrastructure, cloud, athena, networking, security, it management, wireless
    
By: Verisign     Published Date: May 19, 2015

Download this infographic to see observations and insights about attack size and frequency derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and insights from iDefense Security Intelligence Services, from October-December 2014.

Tags : ddos attack trends, ddos protection services, security, networking, it management, wireless, knowledge management
    
By: Verisign     Published Date: May 19, 2015

Download this case study to see why Verisign asserts that such adaptable and well-orchestrated DDoS attacks point to a rapidly evolving threat landscape, where asymmetries afforded to adversaries require rapid response and layered security defenses that can accommodate an ever-expanding array of attack vectors.

Tags : ddos attack, security defenses, attack vectors, networking, security, it management, wireless, knowledge management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.