Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3920Sort Results By: Published Date | Title | Company Name
By: Box     Published Date: May 11, 2015

This white paper focuses on four considerations for a mature mobile strategy to reduce the risk of falling behind other key competitors.

Tags : mature mobile strategy, mobile devices, workflow, security, secure collaboration, it strategy, integration, mobility
    
By: Box     Published Date: May 11, 2015

This paper reveals the 6 essential elements of a mobile strategy.

Tags : mobility, modern mobility strategy, mobility strategy, box, mobile, mobile advantage, security, strategy for mobility
    
By: Nexsan by Imation     Published Date: May 11, 2015

Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.

Tags : imation, nexsan, physical security, camera, surveillence, storage, online surveillance, storage management
    
By: Box     Published Date: May 11, 2015

This paper provides information on mobile content management and evaluates 19 major MCM providers.

Tags : mobile content management, mcm, mcm providers, mobility, content management, cloud, mobile devices, security content
    
By: Box     Published Date: May 11, 2015

This infographic provides information on how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective.

Tags : mobile, mobility, mobile content management, apply mobile to core processes, share content, access to data, byod, mobile
    
By: Box     Published Date: May 11, 2015

This paper illustrates the benefits of using box for mobile for your business.

Tags : mobility, mobile, box, box for mobile, content, mobile apps, mobile productivity, mobile security
    
By: Nexsan by Imation     Published Date: May 11, 2015

It is an inescapable fact that massive, relentless data growth now defines the IT landscape for organizations of all sizes.

Tags : nexsan, imation, data growth, data protection, massive data, dig data, secure storage, infrastructure
    
By: Kaspersky     Published Date: May 07, 2015

In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage.

Tags : protect, advanced threats, cyberattacks, sensitive information, financial profit, defensive measures, secure infrastructure, risk
    
By: Dropbox for Business     Published Date: May 07, 2015

Discusses the importance of evaluating EFSS solutions through the lens of balancing usability and control.

Tags : usability, fss, enterprise, efss solutions, fss usage, employee adaption, mobile computing, application integration
    
By: Dropbox for Business     Published Date: May 07, 2015

Over the past year, Dropbox has released several sets of improvements to its Dropbox for Business product aimed at small business and team use.

Tags : enterprise, collaboration strategies, content management, content strategies, usability, enterprise applications, storage management, mobile computing
    
By: Windstream     Published Date: May 06, 2015

Read this Gartner report to learn how to keep business up and running no matter what.

Tags : business continuity, windstream, gartner, it service, analysis, compliance, disaster recovery, web service security
    
By: Aerohive Networks     Published Date: May 06, 2015

Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi, security, network security, bandwith limitations, ssid, security management, security policies, secure instant messaging
    
By: Tyco Integrated Security     Published Date: May 05, 2015

With security management apps, you can better protect your livelihood -- wherever and whenever you want.

Tags : mobility, mobile devices, networking, security, it management, wireless
    
By: Tyco Integrated Security     Published Date: May 05, 2015

52 percent of all businesses are likely to be victimized within the next three years. Download this white paper top learn how accessible, easy-to-use solutions can help lower security costs and give you peace of mind.

Tags : small businesses, affordability, security, accessibility, networking, wireless, knowledge management
    
By: Tyco Integrated Security     Published Date: May 05, 2015

Maximizing your security resources can be one rewarding way to extend your resources and visibility into your business.

Tags : security resources, security technology, video surveillance, security resources, security, knowledge management
    
By: Tyco Integrated Security     Published Date: May 05, 2015

This white paper outlines the behaviors to recognize and the proactive security measures you can take to protect your employees and customers.

Tags : workplace violence, crime, assault, protection, security equipment, security, knowledge management
    
By: Cisco     Published Date: May 04, 2015

Download this infographic to discover the top three tips when choosing an NGFW (Next Generation Firewall) to protect your business from attacks. The three tips we will review are: • Strong security • Low total cost of ownership • Ease of management and reporting

Tags : next generation firewall, ngfw, security, acquisition, management, reporting, it management, knowledge management
    
By: Dell     Published Date: May 04, 2015

Replacing an aging desktop fleet is an important investment in your business. Faster and more reliable systems that offer the latest technology provide your employees an opportunity to be more productive with less waiting while they work. New desktops also benefit your IT staff, with significantly lower power costs and support for out-of-band management to reduce costly desk side visits.

Tags : performance, repair, aging desktops, desktop replacement, employee productivity, networking, security, it management
    
By: Okta     Published Date: Apr 29, 2015

Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn why.

Tags : identity, iam, management, mobile, security, it management
    
By: Okta     Published Date: Apr 29, 2015

Authenticating users on a variety of endpoints should provide the right balance of user experience, security and workforce productivity. CISOs and IAM leaders need to keep pace with new methods of remote access for the mobile workforce in a constantly changing work environment. Read this report why.

Tags : workforce, ciso, iam, mobile, workforce, security, it management
    
By: Okta     Published Date: Apr 29, 2015

Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers’ privacy and shielding them from fraud and other malicious activities. This report will help S&R pros understand the growing mobile authentication market and its transformative impact on customers’ mobile moments.

Tags : mobile, apps, mobile apps, s&r, fraud, okta, security, it management
    
By: Okta     Published Date: Apr 29, 2015

Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data from outside the corporate network. This presents new security challenges for IT. Read this eGuide to learn ways to secure your mobile workforce.

Tags : mobile, mobile workforce, okta, security, it management
    
By: Okta     Published Date: Apr 29, 2015

2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure — yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.

Tags : theft, research center, c-level, okta, theft research, security, it management
    
By: Okta     Published Date: Apr 29, 2015

As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.

Tags : mfa, authentication. mobile, applications, okta, security, it management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.