Email Security White Papers

Results 101 - 125 of 388Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 07, 2013

HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.

Tags : best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam
    
By: McAfee     Published Date: Mar 07, 2013

Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organizationís most sensitive data.

Tags : database security, database security compliance, database activity monitoring, access control, anti spyware, anti virus, application security, business continuity
    
By: McAfee     Published Date: Mar 07, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: Bit9     Published Date: Mar 07, 2013

Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.

Tags : security, risk management, roi, cost reduction, enterprise, cyber threat, anti spam, anti spyware
    
By: McAfee     Published Date: Feb 12, 2013

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : mcafee, av-test, deep defender, rootkits, detection, network security, email security, intrusion detection
    
By: Tripwire     Published Date: Feb 08, 2013

Continuous monitoring is not a single solutionóitís a best practice for IT security.

Tags : automation, continuous monitoring, security, threat detection, threat prevention, hacker, malware, cyber attack
    
By: McAfee     Published Date: Feb 06, 2013

Users who take work with them everywhere unknowingly jeopardize networks and systems.

Tags : windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
By: McAfee     Published Date: Feb 06, 2013

This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam
    
By: Symantec     Published Date: Jan 31, 2013

Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.

Tags : endpoint protection, security, best practices, survey, anti spam, anti spyware, anti virus, application security
    
By: Symantec     Published Date: Jan 31, 2013

PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.

Tags : endpoint protection, security, performance test, comparison, windows 8, anti spam, anti spyware, anti virus
    
By: HP - Enterprise     Published Date: Jan 24, 2013

The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.

Tags : mobile, vulnerability, byod, dast, sast, testing, risk management, security management
    
By: HP - Enterprise     Published Date: Jan 24, 2013

Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world thatís evolving faster than ever before. Read this dossier to find out more.

Tags : consumerization, byod, risk management, security, anti spam, anti spyware, anti virus, authentication
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This eBook will help you to assess where you currently are in the security landscape, where youíre still unprotected and what you need to do complete your security portfolio.

Tags : security, network security, enterprise, infrastructure, best practices, vulnerability, access control, anti spam
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This eBook will help you to assess where you currently are in the security landscape, where youíre still unprotected and what you need to do complete your security portfolio.

Tags : security, compliance, mobile, tablets, byod, cloud, access control, anti spyware
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.

Tags : cloud, security, attacks, risk, virtualization, encryption, access control, anti spam
    
By: McAfee     Published Date: Jan 23, 2013

Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.

Tags : dos, ddos, attacks, threats, layered security, advanced threats, advanced attacks, malware
    
By: McAfee     Published Date: Jan 23, 2013

A criminal industry develops. This paper explores bot evolution, itís global prevalence, whoís at risk, a look forward and combating bots using Global Threat Intelligence.

Tags : botnets, bots, defense in depth, threat prevention, advanced attacks, malware, access control, anti spam
    
By: Lumension     Published Date: Jan 22, 2013

In this fast-paced webinar, Iíll look at everything thatís new as far as security in Windows 8, with a special focus on mobility.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
    
By: Lumension     Published Date: Jan 22, 2013

In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
    
By: Symantec     Published Date: Jan 11, 2013

Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.

Tags : symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
    
By: Websense     Published Date: Aug 23, 2012

"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.

Tags : phishing, web security, email security, phishing attacks, internet security, web service security
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End