Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 101 - 125 of 255Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Feb 06, 2013

Users who take work with them everywhere unknowingly jeopardize networks and systems.

Tags : windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
By: Lumension     Published Date: Jan 22, 2013

In this age of APTs you canít leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.

Tags : software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam
    
By: Symantec     Published Date: Jan 11, 2013

Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.

Tags : symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
    
By: McAfee     Published Date: Nov 14, 2012

Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers are as determined as ever, and employee-related abuses are on the rise.

Tags : sql, security, database, mcafee, hackers, web service security, open source, data protection
    
By: Bit9     Published Date: Sep 29, 2012

Download Bit9's latest Threat Advisor and learn how you can protect your domain controllers from the Advanced Persistent Threat.

Tags : bit9, technology, online, security, online threats, online security, access control, security management
    
By: Bit9     Published Date: Sep 29, 2012

Download this whitepaper to learn how Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.

Tags : bit9, technology, online, security, online threats, online security, security management, security policies
    
By: Bit9     Published Date: Sep 29, 2012

Download this case study to see how one convenience store chain uses Bit9 as a means of preventing unauthorized devices and applications from being used on its POC systems.

Tags : bit9, technology, retail, ecommerce, digital, online, security, online threats
    
By: Bit9     Published Date: Sep 29, 2012

Download Bit9's latest Threat Advisor and learn how adopting a positive, proactive, trust-based security model provides better application control, improving endpoint protection against advanced attacks while helping to prove compliance with PCI DSS requirements.

Tags : bit9, technology, retail, ecommerce, digital, online, security, online threats
    
By: Bit9     Published Date: Sep 29, 2012

Bit9 is the only company to stop Flame and the RSA attacks. Learn the techniques and approaches that modern attackers are using and why traditional defenses do not work. This webinar discusses the future of cyber attacks. We will get into various advanced persistant threats, how those relate to your own security posture, the tactics you might conisder. Download this on-demand webcast and join Bit9's CTO, Harry Sverdlove, as he explains how these attacks worked and what you can do to stop them.

Tags : bit9, technology, online, security, online threats, online security, internet security, security management
    
By: Websense     Published Date: Aug 23, 2012

"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.

Tags : phishing, web security, email security, phishing attacks, internet security, web service security
    
By: Websense     Published Date: Aug 23, 2012

This mobile security white paper outlines the essential steps for mobile security.

Tags : mobile security, websense, mobile device management, mdm, malware, anti spyware, security management, web service security
    
By: IBM     Published Date: Jul 13, 2012

As you move forward with your cloud initiative, it's critical to develop an effective resiliency management program so that your business remains protected in your new environment. This white paper discusses the key elements that make up a successful cloud-based strategy and examines the critical business areas and functions you'll need to assess.

Tags : ibm, technology, cloud, cloud computing, resiliency, business, white paper, web service security
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Gomez IT     Published Date: Dec 14, 2011

This whitepaper addresses the Web experience challenges companies must address when adopting the cloud. It offers perspective and best practices to assist in the evaluation of cloud providers and development of performance SLAs.

Tags : gomez, cloud computing, cloud risks, web, security, web management, security management, web service security
    
By: Webroot     Published Date: Dec 06, 2011

Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.

Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
By: Thawte     Published Date: Nov 08, 2011

Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, anti spam
    
By: Thawte     Published Date: Oct 31, 2011

Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.

Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!

Tags : webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
By: Thawte     Published Date: Oct 22, 2011

Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.

Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
    
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: EdgeWave     Published Date: Oct 15, 2011

Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.

Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End