Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 101 - 125 of 184Sort Results By: Published Date | Title | Company Name
By: Webroot UK     Published Date: Mar 22, 2010

Move protection to where the threats are managing web-borne threats is becoming a major headache for today's resource-strapped organizations.

Tags : webroot, web security, cloud-based computing, malware, threat protection, data security, anti spyware, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

By using a service based in the cloud, protection against threats is brought nearer to where those threats are located, making it easier and more effective to protect users against security threats such as malware.

Tags : webroot, cloud-based service, web security, malware, security threat, anti spyware, web service security, cloud computing
    
By: Webroot UK     Published Date: Mar 22, 2010

This paper examines the realities of web threats and looks at the promise that cloud-based solutions bring for organisations in terms of providing a higher level of protection against the increasingly complex and sophisticated threats being seen today.

Tags : webroot, web security, cloud computing, malware threats, anti spam, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, remote access, malware, viruses, spyware, phishing, threat protection
    
By: Webroot UK     Published Date: Mar 22, 2010

The web today is a prime vector for attack. Interrupting information flows, which are increasingly transmitted over the internet, has become the prime focus for today's financially motivated hackers.

Tags : webroot, web security protection, hackers, web threats, cloud computing, malware, anti spyware, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats

Tags : webroot, web security service, cloud computing, web threats, business process automation, anti spam, anti spyware, anti virus
    
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control
    
By: Qualys     Published Date: Feb 22, 2010

This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.

Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
By: Websense     Published Date: Feb 16, 2010

This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.

Tags : tco, websense, web security, osterman, hybrid, security solutions, security management, security policies
    
By: Symantec.cloud     Published Date: Feb 12, 2010

IT security needs to work seamlessly across email, web & IM to protect against the latest Converged Threats - FREE Whitepaper

Tags : messagelabs, symantec hosted services, converged threat, it security, web security, malware, messagelabs security safeguard, internet security
    
By: Mimecast     Published Date: Feb 05, 2010

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security
    
By: Symantec.cloud     Published Date: Feb 03, 2010

The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.

Tags : messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
    
By: McAfee     Published Date: Dec 28, 2009

McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.

Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
By: McAfee     Published Date: Dec 09, 2009

Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.

Tags : mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
    
By: Trend Micro, Inc.     Published Date: Nov 25, 2009

The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.

Tags : trend, trend micro, webcast, security, hitrust, web, privacy, ehrs
    
By: Trend Micro SPN     Published Date: Nov 24, 2009

A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: Webroot UK     Published Date: Nov 11, 2009

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration
    
By: Webroot UK     Published Date: Nov 11, 2009

The software-as-a-service model can help you stay ahead of Web and email threats without breaking the bank on infrastructure and management. Find out more in this whitepaper.

Tags : webroot, saas, software-as-a-service, web security, email security, threats, storage management, tco
    
By: Webroot UK     Published Date: Nov 11, 2009

Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!

Tags : webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention
    
By: Webroot UK     Published Date: Nov 11, 2009

This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.

Tags : webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp
    
By: Webroot UK     Published Date: Nov 11, 2009

Service Subscription Takes the Headache Out of Email and Web Threat Management. Read this white paper about the Seven Reasons to Adopt SaaS Security.

Tags : webroot, security saas, web security, email security, security management, internet security, web service security, total cost of ownership
    
By: Iovation     Published Date: Sep 25, 2009

Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.

Tags : software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules
    
By: Iovation     Published Date: Sep 25, 2009

Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.

Tags : iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies
    
By: Iovation     Published Date: Sep 25, 2009

This white paper will help you understand what new and innovative techniques can be used to protect the reputation of your business and keep your members in a safe and trusted environment, while keeping the fraudsters out.

Tags : online dating, online community fraud and abuse, low false positives, pattern matching, web device print, download device print, pattern matching and risk assessment, forensic analysis
    
By: Iovation     Published Date: Sep 25, 2009

Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.

Tags : cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks, cheating, collusion and money laundering, buy
    
Start   Previous    1 2 3 4 5 6 7 8    Next    End