Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 4151Sort Results By: Published Date | Title | Company Name
By: Vectra Networks     Published Date: Aug 03, 2015

Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.

Tags : data, security, threats, protection, advanced threat, ips, ids, firewall
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect prominent securities.

Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.

Tags : malware, data, malware, banking, malware sandbox, authentication, two-factor authentication, identity management
    
By: EMC     Published Date: Aug 03, 2015

This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.

Tags : afa, snapshot technology, data protection, recovery strategies, cloud adoption, production data, emc, snapshot performance
    
By: IBM     Published Date: Jul 31, 2015

Security management for mainframe clouds.

Tags : application security, compliance, internet security, security management
    
By: IBM     Published Date: Jul 31, 2015

Guide to security intelligence.

Tags : security, data, application security, business continuity, compliance, infrastructure
    
By: IBM     Published Date: Jul 31, 2015

Optimize the process of investigating and gathering evidence.

Tags : data, security, threats, protection, business continuity, compliance, hacker detection, intrusion detection
    
By: IBM     Published Date: Jul 31, 2015

New endpoint solution.

Tags : hacker detection, identity management, intrusion detection
    
By: Venafi     Published Date: Jul 27, 2015

Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.

Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
By: Venafi     Published Date: Jul 27, 2015

To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.

Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
    
By: Venafi     Published Date: Jul 27, 2015

Read this important brief to learn how to maintain your cybersecurity and reduce risk.

Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
    
By: Venafi     Published Date: Jul 27, 2015

Read the solution brief to close SSH security gaps and protect your business.

Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
By: Venafi     Published Date: Jul 27, 2015

Read this solution brief to learn how Security Operations teams can eliminate outages.

Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
By: Venafi     Published Date: Jul 27, 2015

See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.

Tags : security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Tags : shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.

Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy, cloud, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.

Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
    
By: IBM     Published Date: Jul 22, 2015

Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.

Tags : productivity, customer service, automation, automated financial transactions, compliance, customer retention, customer satisfaction, best practices
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Understand that hybrid cloud can provide the best.

Tags : disaster recovery, applications, development, testing, cloud, application security, application integration, cloud computing
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Forge Ahead with Hybrid Cloud Plans

Tags : applications, systems integration, cloud, development, application security, productivity, cloud computing, infrastructure
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.