Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 26 - 50 of 3389Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Nov 10, 2014

Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. — Read the report today!  Compliments of Citrix.

Tags : application, deployment, research, enterprise, data center, controller, network, security
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, backup and recovery
    
By: Box     Published Date: Nov 09, 2014

Read how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.

Tags : box, file sharing, mobile workers, mobile phones, smartphones, collaboration, storage, remote access
    
By: McAfee     Published Date: Nov 07, 2014

Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).

Tags : siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança
    
By: McAfee     Published Date: Nov 07, 2014

Saiba como é possível evitar ataques de rede utilizando uma plataforma de SIEM que combina dados históricos com dados em tempo real de origens de rede e políticas de segurança para oferecer contexto sobre o uso de aplicativos, comportamentos dos usuários e outras operações com o objetivo de produzir relatórios otimizados e mais precisos.

Tags : siem, sans, terminal, endpoint, rede, correlação, integração, segurança
    
By: McAfee     Published Date: Nov 07, 2014

De acordo com o SANS Institute, a maioria das organizações está usando dados sobre eventos de segurança para detectar e monitorar comportamentos suspeitos, auxiliar em análises periciais, bem como cumprir os requisitos regulamentares e comprovar essa conformidade. Porém, fica difícil atingir essas metas de segurança com o número cada vez maior e a natureza sofisticada dos ataques. À medida que a disputa entre a segurança e os hackers continua, a McAfee conta com os recursos de que as empresas precisam para manter seus dados seguros e identificar ataques e vulnerabilidades. De acordo com o SANS, a força do McAfee ESM vem da sua facilidade de uso, da velocidade e da flexibilidade na definição de regras e correlações.

Tags : siem, armazenamento de dados, análise de eventos, ataques, análise pericial, segurança, security
    
By: McAfee     Published Date: Nov 07, 2014

Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.

Tags : ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas, security
    
By: McAfee     Published Date: Nov 07, 2014

A conformidade e os riscos financeiros costumavam ser as principais preocupações que motivavam a adoção de uma postura de gerenciamento de segurança e riscos. Leia o whitepaper e saiba como, atualmente, gerenciar os riscos permite compreender uma quantidade maior de dados: varreduras de vulnerabilidades, registros de aplicações e bancos de dados, fluxos, registros de acesso e de sessões, alertas e análise de tendências.

Tags : arquitetura de segurança conectada, big security data, big data, gerenciamento de registros, gerenciamento de logs, siem, segurança, security
    
By: CA Technologies     Published Date: Nov 07, 2014

Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.

Tags : mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security
    
By: CA Technologies     Published Date: Nov 07, 2014

Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.

Tags : business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, wireless, application security
    
By: CA Technologies     Published Date: Nov 07, 2014

Une solution IAM hybride permet aux organisations de migrer vers le Cloud au rythme qui correspond à leurs exigences de réduction des coûts opérationnels et d’améliorer leur agilité.

Tags : ca technologies, migrer vers le cloud, cloud computing, iam hybride permet, identity management, mobile computing, infrastructure
    
By: CA Technologies     Published Date: Nov 07, 2014

Découvrez dans ce livre blanc une technologie unique de gestion des caractéristiques de sécurité, de performances, de conformité et de support de tout type de périphérique, d’application, de contenu ou de courriel, qui préserve la qualité de l’expérience utilisateur mobile.

Tags : mobile user experience, security features, security in the cloud, the mobile user experience, optimising the user experience, mobile computing, mobile data systems, mobile workers
    
By: CA Technologies     Published Date: Nov 07, 2014

Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.

Tags : enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, mobile computing, mobile data systems, mobile workers
    
By: IBM     Published Date: Nov 07, 2014

To build a great mobile app, you need the right skills, tools, and support. That’s why many companies are turning to integrated and collaborative mobile application development environments that let them meet business needs and exceed customer expectations.

Tags : ibm, mobile app, collaboration, mobile development, mobile environments, mobile application, hybrid apps, native apps
    
By: IBM     Published Date: Nov 05, 2014

IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

Tags : ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
By: IBM     Published Date: Nov 05, 2014

This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: IBM     Published Date: Nov 05, 2014

A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.

Tags : ibm, cyber security, risk management, business threats, security framework, business protection, cyber protection, security framework
    
By: Bazaarvoice     Published Date: Nov 05, 2014

This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.

Tags : bazaarvoice, customer loyalty, authemticity, customer relationships, authentic users, generated content, best practices, inauthentic practices
    
By: IBM     Published Date: Nov 04, 2014

This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.

Tags : ibm, security, risk, byod, safeguard, protection, threat protection, it security
    
By: KnowBe4     Published Date: Nov 03, 2014

According to security researchers at Dell SecureWorks, more than 830,000 victims worldwide have been infected with ransomware like CryptoWall 2.0. This is a 25% increase in criminal encryption infections since late August 2014. Antivirus software often does not recognize the constantly changing ransomware variants, making every organization vulnerable. The first ransom usually has a deadline of 7 days and demands about $500. Even the bad guys understand it's not always easy to get your hands on Bitcoins quickly. But when this first deadline is not made, the ransom doubles to roughly $1,000, depending on Bitcoin exchange rates. KnowBe4 is so confident that their Kevin Mitnick Security Awareness Training works, if you get hit with ransomware after employees step through this training, they'll pay the ransom! Find out how affordable this is for your organization now. Get a quote now for this unprecedented offer.

Tags : knowbe4, security awareness training, security awareness, cryptowall, bitcoins, database file, corrupted files, phishing
    
By: Intralinks     Published Date: Oct 30, 2014

While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur

Tags : file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
    
By: Intralinks     Published Date: Oct 30, 2014

The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.

Tags : rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
    
By: Intralinks     Published Date: Oct 30, 2014

Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi

Tags : enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
By: Aruba Networks     Published Date: Oct 27, 2014

Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.Weak security on your guest network can expose your business to external threats and create serious liability issues.

Tags : network access, user connection, high-performance guest access, security, external threats, liability issues, networking
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.