Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 101 - 125 of 239Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
By: Thawte     Published Date: Nov 08, 2011

Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, anti spam
    
By: Thawte     Published Date: Oct 31, 2011

Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.

Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!

Tags : webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
By: Thawte     Published Date: Oct 22, 2011

Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.

Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
    
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: EdgeWave     Published Date: Oct 15, 2011

Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.

Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.

Tags : application security, authentication, email security, high availability, identity management, internet security, intrusion detection, intrusion prevention
    
By: Secunia     Published Date: Oct 12, 2011

Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: CA Technologies     Published Date: Sep 29, 2011

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
By: CA Technologies     Published Date: Sep 29, 2011

Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.

Tags : risk, attack, security, business, access control, anti virus, application security, identity management
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

Aberdeen Group research finds that file transfer has transformed from a loose collection of low-level protocols to full-featured, enterprise-class solutions for secure, reliable managed file transfer. This report examines how organizations benefit from managed file transfer solutions, and recommends steps to success for all organizations.

Tags : yousendit, technology, greater business value, reliable file transfer, low-level protocols, security, internet security, web service security
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to learn five key ways MFT makes a difference for your business.

Tags : seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to discover more about the true cost of "free" file sharing systems and file sharing best practices.

Tags : seeburger, file sharing, erp systems, file storage, security, file transwer, tco, mft
    
By: Fortinet, Inc.     Published Date: Jul 27, 2011

In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.

Tags : fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.

Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End