Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3537Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jan 15, 2015

Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.

Tags : comparitive analysis, datacenter, social, analytics, security, data management
    
By: Cisco     Published Date: Jan 15, 2015

In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.

Tags : operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation
    
By: Cisco     Published Date: Jan 15, 2015

The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.

Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
    
By: Cisco     Published Date: Jan 15, 2015

For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.

Tags : attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses
    
By: Webroot Inc     Published Date: Jan 14, 2015

Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.

Tags : malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
    
By: Webroot Inc     Published Date: Jan 14, 2015

PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.

Tags : endpoint performance, performance testing, security software, security
    
By: Webroot Inc     Published Date: Jan 14, 2015

Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.

Tags : endpoint protection, networks, security software, endpoint devices, security
    
By: Dyn     Published Date: Jan 14, 2015

A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?

Tags : mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based
    
By: Dyn     Published Date: Jan 14, 2015

Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.

Tags : cloud based, dns service, ddos attack, user experience, infrastructure, dns performace, ddos, business intelligence
    
By: Dyn     Published Date: Jan 14, 2015

Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.

Tags : ddos attack, integration, mitigation, ddos outage, business protection, business security, infrastructure, ddos
    
By: Dyn     Published Date: Jan 14, 2015

Whether you are a seasoned expert or just beginning to look into how DNS can improve the performance of your businesses’ services, let this quick guide to DNS terminology be your comprehensive one-stop shop.

Tags : dns, domain name system, ip addresses, terminology, denial of service, query, cache, dns client
    
By: IBM     Published Date: Jan 09, 2015

Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.

Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
By: IBM     Published Date: Jan 09, 2015

As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage

Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
By: IBM     Published Date: Jan 09, 2015

Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? You’ll better understand the value that firms are deriving from UC, the status of its adoption, and the barriers to full implementation.

Tags : ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
By: CDW     Published Date: Jan 07, 2015

Learn how Microsoft’s end of support for its 2003 Windows Server presents the best opportunity for a technology upgrade and see what your organization should do to take advantage of this unique opportunity.

Tags : server, performance, migrating systems, technology, update, support, microsoft, security
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

As business becomes more connected and as data moves further outside the organizational walls, the supply chain has become a critical chink in the security armor. This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Tags : small business backdoors, supply chain, secuirty armor, security
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper explores the good, bad and ugly of big data in cybersecurity and provides tips for understanding cyber risk in complete business context that includes your industry sector, infrastructure, company size, supply chain, location, your online presence, and many more factors.

Tags : big data, cybersecurity, industry sector, infrastructure, online presence, security
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Tags : cybersecurity, business decision-makers, cyber risk framework, security
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

Tags : cyber insurance, cybercrime, business risk, cyber insurance, security, business activity monitoring
    
By: CDW     Published Date: Dec 29, 2014

Learn the best practices for migrating to a new server operating system and see how the switch may be challenging, but will allow your organization to vastly improve IT operations to support new technologies such as cloud computing.

Tags : server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.