Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3425Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Nov 19, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts.

Tags : internet security, istr, cybercrime, internet security trends, anti spam, anti spyware, anti virus, application security
    
By: Symantec     Published Date: Nov 19, 2014

This info-graphic provides important statistics and information on web-based targeted attacks and how you can help protect yourself.

Tags : web based targeted attacks, internet security, protections from web attacks, anti spam, anti spyware, anti virus, firewalls, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
By: Symantec     Published Date: Nov 19, 2014

The top ten tips on how to secure your business against cyber risk and threats.

Tags : tips for cyber resilience, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: General: Partially cloudy: the benefits of hybrid deployment models

Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
By: Symantec     Published Date: Nov 19, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, data protection, database security, virtualization
    
By: ClickSoftware     Published Date: Nov 17, 2014

From calculator watches to smart glasses, this paper will guide you through the evolution of wearable technology and its impact on the service industry. This whitepaper will help you to understand how your business can benefit by getting ahead of the trend through implementing wearable technology within your organisation.

Tags : shift scheduling, wearable technology, the evolution of wearable technology, byow, it management, mobile computing, mobile data systems, mobile workers
    
By: IBM     Published Date: Nov 14, 2014

Join Gartner and IBM for an informative webinar where you will learn how to combine best of breed analytic solutions to provide a low latency, shared big data infrastructure. This helps government IT departments make faster decisions by analyzing massive amounts of data, improving security, detecting fraud, enabling faster decisions and saving cost by optimizing and sharing your existing infrastructure.

Tags : ibm, hadoop, data, business analytics, data analytics, business intelligence, security management, business activity monitoring
    
By: Actiance, Inc.     Published Date: Nov 13, 2014

The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!

Tags : actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
    
By: McAfee     Published Date: Nov 12, 2014

This paper discusses the Office 365 platform, its applicability for organizations of all sizes, and the need for third-party solutions which complement the platform to maintain a strong security posture.

Tags : office 365, osterman research, security for office 365, security, best practices
    
By: McAfee     Published Date: Nov 12, 2014

This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.

Tags : osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails
    
By: McAfee     Published Date: Nov 12, 2014

This brief discusses how hybrid email protection can address your privacy concerns while still gaining the benefits of cloud-based email security.

Tags : hybrid email security, mcafee email protection, security, it management, business intelligence
    
By: McAfee     Published Date: Nov 12, 2014

This infographic outlines the results of the McAfee Phishing Quiz.

Tags : mcafee email phishing quiz, email phishing, spear phishing, security, it management, business intelligence
    
By: McAfee     Published Date: Nov 12, 2014

Gartner recognizes McAfee as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on July 1, 2014.

Tags : gartner magic quadrant, secure email gateways, security, it management, business intelligence
    
By: McAfee     Published Date: Nov 12, 2014

Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.

Tags : gartner magic quadrant, secure web gateways, mcafee web gateway, advanced threat defense, security, business intelligence
    
By: McAfee     Published Date: Nov 12, 2014

This white paper guides you through the pros and cons of direct vs. transparent proxies and makes recommendations that will help you secure your company and your users more effectively.

Tags : secure web gateway, direct or transparent proxy, security, it management, business intelligence
    
By: McAfee     Published Date: Nov 12, 2014

This white paper describes a wide range of Internet-based attack methods and explains how Web Protection technology protects against them.

Tags : secure web gateway, web protection, gateway anti-malware engine, advanced threat defense, application control, security, it management, business intelligence
    
By: McAfee     Published Date: Nov 12, 2014

This paper characterizes web threats and explains why most security solutions in place today are ineffective.

Tags : web security, web protection, mcafee web gateway, mcafee saas web protection, mcafee data loss prevention, security, it management, business intelligence
    
By: McAfee     Published Date: Nov 12, 2014

This report takes a look at the state of “shadow IT” in companies worldwide and reveals some surprising results.

Tags : shadow it, frost & sullivan, security, it management, business intelligence
    
By: GreenSQL     Published Date: Nov 11, 2014

This report provides the 10 essential SQL server security tasks

Tags : sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
By: GreenSQL     Published Date: Nov 11, 2014

This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.

Tags : sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.