Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3338Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 06, 2014

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : internet security, ssl, customer satisfaction
By: Thawte     Published Date: Oct 06, 2014

A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.

Tags : ssl certificates, application, web server, sensitive information, customer confidence, ssl
By: Thawte     Published Date: Oct 06, 2014

In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.

Tags : apache web server, digital certificate, ssl certificate, benefits, ssl
By: Thawte     Published Date: Oct 06, 2014

Why Self-Signed Certificates are Much Costlier-and Riskier- Than Working with a Trusted Security Vendor.

Tags : ssl certificates, self-signed, trusted security vendor, hidden costs, ssl
By: Thawte     Published Date: Oct 06, 2014

Leveraging Multi-Use Digital Certificates to Simplify Certificate Management and Reduce Costs.

Tags : san, ssl certificates, management, reduce costs, multi-use, ssl
By: Workday     Published Date: Oct 06, 2014

Définition du véritable SaaS et des bénéfices pour votre entreprise

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, storage, web service security, mobile data systems
By: Workday     Published Date: Oct 06, 2014

Comment reconnaître les applications et fournisseurs de solutions Cloud efficaces

Tags : the cloud, cloud providers, cloud computing, modern saas, mobile computing, mobile data systems, virtualization, mobile device management
By: Damballa     Published Date: Oct 03, 2014

Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty

Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
By: Damballa     Published Date: Oct 03, 2014

The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence

Tags : damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
By: Damballa     Published Date: Oct 03, 2014

Damballa’s Q2 2014 “State of Infections” report discussed the state of the enterprise under attack and trends in threats seen in the second quarter of 2014. Key findings include: • The rise of ransomware • The relationship between the size of an enterprise and its infection rate.

Tags : damballa, state of infection, enterprise, attacks, reduce risk, infection rate, security
By: Damballa     Published Date: Oct 03, 2014

In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised. • Eight detection engines produce fidelity in True Positives • Risk engines priorities response to infections that matter most

Tags : damballa, advanced threats, failsafe, true positives, risk engines, infections, security
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
By: Singlehop     Published Date: Oct 01, 2014

As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.

Tags : cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
By: OpenText     Published Date: Oct 01, 2014

Interactions with technology and customers have evolved to new heights. Organizations that create a rich and consistent digital presence across many channels will thrive in the global marketplace. The challenge is to extract value from managed content, optimize, and personalize that content delivery, and bridge the chaotic interactive world with the secure data repositories that reside behind the firewall. In today's customer-centric era, brands must deliver compelling and engaging experiences fueled by a contextual understanding of their global customers, all while adhering to established information governance policies and standards.

Tags : opentext, cem, omni-channel, adaptive content, secure data, global marketplace, customer centric, brands
By: OpenText     Published Date: Oct 01, 2014

Customer experiences have evolved tremendously over the years. Technology has made buyers smarter and more empowered; with online reviews and mobile web access, customers know more about a company's products, services, competitors, and pricing than the organization may know itself. Today's consumers expect tailored, engaging experiences and rich content delivered seamlessly across a variety of touch points.

Tags : opentext, cem, digital asset management, onmi channel, rich media, online reviews, mobile web access, engagement
By: EMA     Published Date: Oct 01, 2014

A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:

Tags : quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
By: Sourcefire, LLC     Published Date: Sep 30, 2014

Download this infographic today to gain a better understanding of integrated threat defense and the visibility to discover and protect against socially engineered exploits.

Tags : cisco, sourcefire, network security, integrated threat defense, big data analysis, real-time monitoring, security, business analytics
By: Sourcefire, LLC     Published Date: Sep 30, 2014

As threats continue to penetrate networks, organizations need to find new ways to defend against them. NSS Labs recently conducted the most rigorous next-generation firewall (NGFW) testing to date. Cisco ASA with FirePOWER Services excelled as compared to other tested products. Download this Data Sheet now to find out how Cisco ASA with FirePOWER Services excels in NSS Labs Testing.

Tags : cisco, sourcefire, network security, firewall security, next-generation firewall, ngfw, nss, nss labs
By: Sourcefire, LLC     Published Date: Sep 30, 2014

Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.

Tags : cisco, sourcefire, network security, threat centric, security model, cybercrime, full attack continuum, infrastructure
By: Oracle     Published Date: Sep 30, 2014

Measure your content marketing effectiveness and value by following these five steps, brought to you by the Oracle Marketing Cloud.

Tags : personalize, engagement, advocacy, revenue, marketing, cloud, oracle, identity management
By: Foxit     Published Date: Sep 18, 2014

IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?

Tags : foxit, document management strategy, revenue generated technology, storage, security, tight budgets, pdf solutions, enterprise applications
By: Centrify Corporation     Published Date: Sep 16, 2014

A single, unified solution for managing Macs and mobile devices, Centrify User Suite, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory, letting your IT department leverage existing expertise, tools and processes. By managing user identity and authentication in Active Directory, Centrify User Suite, Mac Edition, extends Group Policy-based security management to Mac and mobile users. In addition, the solution supports smart-card login to Active Directory by Mac users. Your employees reap the rewards that come with effortless access to information, applications and services. And the enterprise benefits from a unified, integrated management solution that maximizes security, streamlines operations and reduces cost.

Tags : parallel infrastructure, enterprise, centralized management, user identity and authentication, active directory, enterprise benefits, streamline operations, security
By: Centrify Corporation     Published Date: Sep 16, 2014

Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be “the most devastating” due to the amount of damage privileged users can inflict and the type of data they can access.

Tags : unified identity, hackers and outside attacks, accessible data, privileged users, employee negligence, identity management, password management, security management
By: Centrify Corporation     Published Date: Sep 16, 2014

The major trends challenging IT organizations today are the increasing dissimilarities and hybridization of platforms inside and outside the organization. And the rush to deploy SaaS applications and the explosion in smart phone and tablet devices that users are bringing to work for personal productivity. This fractured identity environment results in significant management challenges for IT, and frustration and lower productivity for users forced to remember multiple usernames and passwords. Unified identity architecture ensures your on-premise Active Directory infrastructure can be securely leveraged to quickly bring servers (UNIX, Linux, and Windows), applications (on-premise, SaaS, and mobile) and endpoints (Mac and Mobile devices) into line with security best practice and compliance. This paper will cover the practical path of unified identity management across multiple platforms including data center, cloud, and mobile.

Tags : data center, cloud and mobile, saas applications, smart phone and tablet devices, directory infrastructure, path to unified identity, password management, mobile data systems
By: Centrify Corporation     Published Date: Sep 16, 2014

IT professionals are grappling with not one, but three revolutions at the same time. • First, cloud computing provides easy and dynamic access to information technology. • Next, the ecosystem of cloud-based SaaS applications has exploded thanks to cloud computing. • Finally, this SaaS ecosystem has helped power an even bigger boom of consumer-friendly mobile devices and apps that access SaaS. This Essential Guide examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access, and management of SaaS applications while reducing password sprawl. This guide will also review how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and additionally help evaluate the options available on the market.

Tags : saas, cloud computing, consumer-friendly, mobile devices, access to saas, password sprawl, password management, customer interaction service
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.