Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 4056Sort Results By: Published Date | Title | Company Name
By: VMware, Inc.     Published Date: Jul 10, 2015

Forge Ahead with Hybrid Cloud Plans

Tags : applications, systems integration, cloud, development, application security, productivity, cloud computing, infrastructure
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Evaluating hybrid cloud for workloads.

Tags : reliability, application, security, compliance, application, application security, high availability, application integration
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

The paper explores why security is being left behind or completely out of app development.

Tags : mobile applications, security, app development, mobile application insecurity, software development, enterprise applications
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.

Tags : app management, app security, privacy, data passing, mobile app, networking, security, software development
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.

Tags : mobile device management, education, educators, students, app management, smartphone, tablet, classroom
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.

Tags : magic quadrant, enterprise mobility management, emm, mobility security, vendors, networking, security, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.

Tags : enterprise mobile management, emm, ibm, vendors, mobile management strategy, networking, security, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.

Tags : enterprise mobility management, emm, ovum, vendors, tablet, smartphone, mobile device, networking
    
By: Bit9     Published Date: Jul 09, 2015

New cyber-security technology architectures are being designed for automation, integration, and orchestration, and could unify point tools to improve incident prevention, detection, and response while streamlining cyber-security operations. Bit9 + Carbon Black has embraced this new model and designs its products for out-of-the-box integration.

Tags : bit9, cyber security, security processes, cyber security architecture, security, it management, knowledge management
    
By: Bit9     Published Date: Jul 09, 2015

This eBook will outline the strategies and tactics cyber criminals use to attack corporate endpoints and servers. It will also provide you with strategies and solutions your organization can use to arm your endpoints against these attacks.

Tags : bit9, financial services, endpoint security, security solutions, endpoint software, security, it management, knowledge management
    
By: Bit9     Published Date: Jul 09, 2015

Financial services organizations are responsible for protecting sensitive customer information regardless of how it’s transmitted, where it resides or how authorized users access it. Fail to do so, and the effects can be devastating: loss of highly confidential and sensitive information; financial penalties; and damaged trust and credibility. Endpoints such as ATMs, scanners, and peripherals (e.g. digital signing devices, tablets, mobile, and any other device that has an IP address or URL) have created increased liability and need to be tracked, monitored and managed in real-time. By establishing more effective endpoint controls and safeguards for data, organizations can significantly reduce the risks of business interruptions, non-compliance, data breaches and advanced persistent threats (APTs).

Tags : bit9, financial services, compliance solutions, data breaches, security, it management, knowledge management
    
By: VMware, Inc.     Published Date: Jul 09, 2015

Cloud for Disaster Recovery

Tags : cloud, environment, consistency, flexible, disaster, recovery, infrastructure, disaster recovery
    
By: VMware, Inc.     Published Date: Jul 09, 2015

Cloud-based DR is the top strategy.

Tags : cloud, disaster recovery, solution, data, infrastructure, productivity, cloud computing
    
By: VMware, Inc.     Published Date: Jul 09, 2015

This paper talks about the benefits and chance that come with cloud computing in a federal agency level.

Tags : cloud computing, cloud solutions, cloud collaboration, opdivs, hhs, health and human services, hybrid cloud platform, cloud models
    
By: IBM     Published Date: Jul 09, 2015

This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.

Tags : application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile, enterprise applications
    
By: CDW     Published Date: Jul 08, 2015

Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.

Tags : dlp, data loss, security, best practices, access control, authentication, identity management, security management
    
By: CDW     Published Date: Jul 08, 2015

A key to safeguarding data and apps is finding the right partner.

Tags : security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
    
By: CDW     Published Date: Jul 08, 2015

It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.

Tags : security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management
    
By: CDW     Published Date: Jul 08, 2015

Keep data safe, even as it moves outside the perimeter of the traditional network.

Tags : security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management
    
By: CDW     Published Date: Jul 08, 2015

An effective data loss prevention program requires the right technologies and policies in place and working together.

Tags : dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management
    
By: CDW     Published Date: Jul 08, 2015

Addressing vulnerabilities in this growing risk environment.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.