Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 2880Sort Results By: Published Date | Title | Company Name
By: Code 42     Published Date: Apr 08, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

A large amount of mission-critical data exists exclusively on laptops and desktops (i.e. "endpoints") making them a primary source of unnecessary (and often unrecognized) data loss risk for today's organizations. Through helping thousands of top brands around the world properly manage and protect the critical corporate data on their endpoints, Code 42 identified the five common stages of "enterprise endpoint backup grief." In which stage is your organization?

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

A new research survey reveals several important—and potentially alarming—trends on endpoint backup. As more and more users create essential data on their desktops and laptops—and often store at least a copy of that data on those devices—it’s increasingly clear that endpoint backup must be a fundamental part of the IT department’s mandate when it comes to ensuring availability of critical data.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

Traditional backup protected information stored on servers in data centers, and it was very manageable. A predictable, controlled, contained environment that underwent scheduled backups and updates. But then the inevitable happened: office employees began saving information to desktops; mobile workers began doing the same with laptops; and backup admins began losing control.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

There’s no doubt consumer-grade sync and share solutions are convenient, but it’s the risk they introduce to the enterprise that keeps IT leaders up at night. But what really constitutes an enterprise-grade sync and share solution? To get a second glance from enterprise IT, sync and share solutions must, at a minimum, include the basic business feature sets: security, integrations, roles and permissions, audit trails,remote wipe, comprehensive APIs, real-time administration, bandwidth controls and de-duplication.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Cisco     Published Date: Apr 08, 2014

Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our market analysis of the vendors highlights key differences in these capabilities and other key functions.

Tags : cisco, malware detection, malware threats, security, cloud computing, swg vendors, data center
    
By: Cisco     Published Date: Apr 03, 2014

The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.

Tags : cisco, security, firewall, global threat, trends, applications, cloud
    
By: Cisco     Published Date: Apr 03, 2014

The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.

Tags : cisco, security, firewall, global threat, trends, applications, cloud
    
By: Cisco     Published Date: Apr 03, 2014

This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.

Tags : next-generation firewall, byod, social media, applications, it trends, security
    
By: Cisco     Published Date: Apr 03, 2014

This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.

Tags : next-generation firewall, byod, social media, applications, it trends, security
    
By: Cisco     Published Date: Apr 03, 2014

This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.

Tags : security, firewall, next generation, applications, byod, threats
    
By: Cisco     Published Date: Apr 03, 2014

This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.

Tags : security, firewall, next generation, applications, byod, threats
    
By: Riverbed     Published Date: Apr 03, 2014

The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.

Tags : riverbed, npm, network performance management, performance management, network management, networking, performance tools, security
    
By: HP Enterprise Services     Published Date: Apr 02, 2014

A video explaining how high-end replication and fail over solutions used to be economical only for stock exchanges and other similar environments, but not anymore. Find out how HP can help you cut recovery time and data loss with a cloud-based disaster recovery solution that is less than you would think.

Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, networking, security
    
By: HP Enterprise Services     Published Date: Apr 02, 2014

This new disaster-recovery service recovers traditional IT environments to the cloud, reducing recovery time by 90% and data loss by 99% for about the same price you may have paid a few years ago.

Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, enterprise applications
    
By: Dyn     Published Date: Apr 02, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Dyn     Published Date: Apr 02, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Dyn     Published Date: Mar 27, 2014

DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.

Tags : dyn, dns, security risks, arbor networks survey, ddos attacks, dns amplification, amplification exploits, network performance
    
By: Dyn     Published Date: Mar 27, 2014

The cost of security might seem steep, but compared to what you’ll have to pay to mitigate a DDoS attack, it’ll look like chump change. DDoS attacks don’t just cost your company the annoyance of downtime, but brand reputation, customer acquisition, and of course, sales all are affected.

Tags : dyn, ddos attack, cost of downtime, business transactions, infrastructure, ponemon institute study, ddos defense, productivity
    
By: Dyn     Published Date: Mar 27, 2014

Do-it-yourself projects are great and can save you money, just not when it comes to doing your own DNS. In this paper, learn about four different reasons why outsourcing your DNS will actually save you money and time in the long run.

Tags : dyn, dns, outsourcing dns, it management, network performance, dns services, dyn pop, isp dns networks
    
By: Dyn     Published Date: Mar 27, 2014

Having trouble reaching your customers’ inboxes? You might have a poor sender reputation. Similar to a credit score, sender reputations reflect how good or bad your sending habits are If your reputation is lower than you’d like just follow these 4 easy steps to start hitting the inbox.

Tags : dyn, sender reputation, ip and domain, warming an ip, ip addresses, email program, maintaining lists, spam trigger words
    
By: Turn     Published Date: Mar 27, 2014

In this study from Forbes Insights and Turn, learn what privacy means to marketers and consumers.

Tags : turn, forbes insights, privacy, big data, marketing, advertising, marketing solutions, security
    
By: Dyn     Published Date: Mar 27, 2014

It’s well known that transactional email is used to send out shipping notices or password resets, but did you know that due to its high click-through rates, it can be a great way to communicate with your customers? With this guide, find out what you might be missing in your transactional emails.

Tags : dyn, dns, email, transactional email, email security, click through rates, consumer interaction, email delivery
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.