Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 2890Sort Results By: Published Date | Title | Company Name
By: Code 42     Published Date: Apr 08, 2014

Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Adding complexity is the mounting list of government regulations to which enterprises must comply. Read how endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

A large amount of mission-critical data exists exclusively on laptops and desktops (i.e. "endpoints") making them a primary source of unnecessary (and often unrecognized) data loss risk for today's organizations. Through helping thousands of top brands around the world properly manage and protect the critical corporate data on their endpoints, Code 42 identified the five common stages of "enterprise endpoint backup grief." In which stage is your organization?

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

A new research survey reveals several important—and potentially alarming—trends on endpoint backup. As more and more users create essential data on their desktops and laptops—and often store at least a copy of that data on those devices—it’s increasingly clear that endpoint backup must be a fundamental part of the IT department’s mandate when it comes to ensuring availability of critical data.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

Traditional backup protected information stored on servers in data centers, and it was very manageable. A predictable, controlled, contained environment that underwent scheduled backups and updates. But then the inevitable happened: office employees began saving information to desktops; mobile workers began doing the same with laptops; and backup admins began losing control.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

There’s no doubt consumer-grade sync and share solutions are convenient, but it’s the risk they introduce to the enterprise that keeps IT leaders up at night. But what really constitutes an enterprise-grade sync and share solution? To get a second glance from enterprise IT, sync and share solutions must, at a minimum, include the basic business feature sets: security, integrations, roles and permissions, audit trails,remote wipe, comprehensive APIs, real-time administration, bandwidth controls and de-duplication.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Cisco     Published Date: Apr 03, 2014

The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.

Tags : cisco, security, firewall, global threat, trends, applications, cloud
    
By: Cisco     Published Date: Apr 03, 2014

The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.

Tags : cisco, security, firewall, global threat, trends, applications, cloud
    
By: Cisco     Published Date: Apr 03, 2014

This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.

Tags : next-generation firewall, byod, social media, applications, it trends, security
    
By: Cisco     Published Date: Apr 03, 2014

This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.

Tags : next-generation firewall, byod, social media, applications, it trends, security
    
By: Cisco     Published Date: Apr 03, 2014

This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.

Tags : security, firewall, next generation, applications, byod, threats
    
By: Cisco     Published Date: Apr 03, 2014

This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.

Tags : security, firewall, next generation, applications, byod, threats
    
By: Riverbed     Published Date: Apr 03, 2014

The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.

Tags : riverbed, npm, network performance management, performance management, network management, networking, performance tools, security
    
By: HP Enterprise Services     Published Date: Apr 02, 2014

A video explaining how high-end replication and fail over solutions used to be economical only for stock exchanges and other similar environments, but not anymore. Find out how HP can help you cut recovery time and data loss with a cloud-based disaster recovery solution that is less than you would think.

Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, networking, security
    
By: HP Enterprise Services     Published Date: Apr 02, 2014

This new disaster-recovery service recovers traditional IT environments to the cloud, reducing recovery time by 90% and data loss by 99% for about the same price you may have paid a few years ago.

Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, enterprise applications
    
By: Dyn     Published Date: Apr 02, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Dyn     Published Date: Apr 02, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Turn     Published Date: Mar 27, 2014

In this study from Forbes Insights and Turn, learn what privacy means to marketers and consumers.

Tags : turn, forbes insights, privacy, big data, marketing, advertising, marketing solutions, security
    
By: SilverSky     Published Date: Mar 26, 2014

The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.

Tags : silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services
    
By: SilverSky     Published Date: Mar 26, 2014

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.

Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
By: SilverSky     Published Date: Mar 26, 2014

The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.

Tags : silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center
    
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, authored by technology market research firm The Radicati Group, the paper covers the ten reasons you should outsource your archiving solution, the seven unique benefits of archiving in the cloud and the how the SilverSky solution, powered by IBM compares.

Tags : silversky, ibm, radicati group, technology market research, cloud mailbox, email archiving, cloud based email archiving, archiving solution
    
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.

Tags : silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange
    
By: SilverSky     Published Date: Mar 26, 2014

This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.

Tags : silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.