Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3286Sort Results By: Published Date | Title | Company Name
By: Sourcefire, LLC     Published Date: Sep 04, 2014

The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.

Tags : cisco, network security, sourcefire, security report, cyber attack, malware, outdated software, cybersecurity
    
By: CradlePoint     Published Date: Sep 04, 2014

Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.

Tags : security risks, crisis communications, security breaches, compromising customer data, security
    
By: McAfee     Published Date: Sep 04, 2014

Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.

Tags : arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs siem, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.

Tags : siem, sans, endpoint, red, correlación, integración, seguridad, security
    
By: McAfee     Published Date: Sep 04, 2014

El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.

Tags : siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.

Tags : ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas, security, network security
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: IBM     Published Date: Sep 02, 2014

This brief webcast will cover the new and enhanced capabilities of Elastic Storage 4.1, including native encryption and secure erase, flash-accelerated performance, network performance monitoring, global data sharing, NFS data migration and more.

Tags : migration, monitoring, network performance, network performance management, storage management, encryption
    
By: NaviSite     Published Date: Sep 02, 2014

This whitepaper explores the reasons behind changing traditional desktop computing strategies, why cloud-hosted virtual desktops are a compelling solution for many businesses and how to leverage cliud-hosted desktops for windows 7 migrations, mobile and departmental workers, and disaster recovery scenarios.

Tags : virtual desktops, cloud hosted virtual desktops, navisite, remote access, cloud computing, mobile device management
    
By: NaviSite     Published Date: Sep 02, 2014

This white paper will deliver data that provides valuable information based on real compute scenarios to assist buyers of cloud services in understanding how their workloads might perform and what costs are associated with those environments across multiple cloud computing platforms BEFORE they invest in the selection of a cloud computing provider.

Tags : choosing a cloud provider, how to choose a cloud vendor, navisite, wireless, enterprise applications, cloud computing, infrastructure, mobile device management
    
By: Lumension     Published Date: Aug 29, 2014

Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.

Tags : server, security, anti-virus, endpoint security
    
By: RSA     Published Date: Aug 28, 2014

Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.

Tags : data loss, prevention, risk management, dlp, governance, framework, security, data management
    
By: RSA     Published Date: Aug 28, 2014

A major shift has occurred with Identity and Access Management (IAM) in the past few years. Organizations have realized that the traditional approach to IAM doesn't work. It doesn't work because IT doesn't have the context to make the decisions around access. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.

Tags : access management, iam, intelligence, business context, identity, security, data management
    
By: RSA     Published Date: Aug 28, 2014

Lines of business are being asked to move faster and get access provisioned more quickly, yet organizations have to be more mindful of the risk around managing access, and still enterprises want a simpler, more lightweight approach to provisioning. Today’s organizations are demanding a business-centric approach to provisioning.

Tags : provisioning, risk, managing access, enterprises, security
    
By: RSA     Published Date: Aug 28, 2014

Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.

Tags : data breach, data access, governance, risk, prevention, security, data management
    
By: Micro Focus     Published Date: Aug 28, 2014

Enabling technologies to streamline regulatory and legislative changes.

Tags : it compliance programs, risk management, it management, data management, compliance
    
By: Micro Focus     Published Date: Aug 28, 2014

Deliver value back to the business faster than before with the Micro Focus Enterprise solution set. Micro Focus' products for IBM zEnterprise make your mainframe work even smarter. Successfully achieve rapid Time to Value of core mainframe applications, helping tackle the growing IT innovation, maintenance and compliance backlog. Faster application service delivery is achieved through technology that transforms mainframe application analysis, modernization, development, testing and workload optimization.

Tags : mainframe, core applications, it innovation, data management, compliance
    
By: Neustar     Published Date: Aug 27, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property.

Tags : ddos attacks, it security, data breaches, ddos impact report, application security, ddos, security management
    
By: Workday     Published Date: Aug 27, 2014

This paper provides a clear insight into the real SaaS manifesto

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, knowledge management, enterprise applications, storage
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will help you navigate the virtualization solutions available and explain how Hyper-V can benefit you.

Tags : backup, high availability, disaster recovery, virtualization software, hyper-v, backup and recovery, clustering, network attached storage
    
By: Vision Solutions     Published Date: Aug 26, 2014

This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.

Tags : systems migrations, business downtime, system migration, business continuity, vision solutions, storage virtualization, disaster recovery, high availability
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will lead you through 3 essential steps to help ensure business continuity and survival.

Tags : guide to recovery, business continuity, disaster recovery, downtime, business impact of downtime, system migration, system upgrading, vision solutions technology
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper explores the market leading solutions available for data protection and recoverability.

Tags : data protection, data recovery, geocluster, data cluster. failover clustering, storage, backup and recovery, clustering, storage management
    
By: Lumension     Published Date: Aug 25, 2014

"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli

Tags : java, insecurity, vulverabilities, computing, security
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.