Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 101 - 125 of 228Sort Results By: Published Date | Title | Company Name
By: Secunia     Published Date: Oct 12, 2011

This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: CA Technologies     Published Date: Sep 29, 2011

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
By: CA Technologies     Published Date: Sep 29, 2011

Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.

Tags : risk, attack, security, business, access control, anti virus, application security, identity management
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

Aberdeen Group research finds that file transfer has transformed from a loose collection of low-level protocols to full-featured, enterprise-class solutions for secure, reliable managed file transfer. This report examines how organizations benefit from managed file transfer solutions, and recommends steps to success for all organizations.

Tags : yousendit, technology, greater business value, reliable file transfer, low-level protocols, security, internet security, web service security
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to learn five key ways MFT makes a difference for your business.

Tags : seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to discover more about the true cost of "free" file sharing systems and file sharing best practices.

Tags : seeburger, file sharing, erp systems, file storage, security, file transwer, tco, mft
    
By: Fortinet, Inc.     Published Date: Jul 27, 2011

In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.

Tags : fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.

Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Blue Coat Systems     Published Date: Jul 07, 2011

This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Akamai     Published Date: Jul 01, 2011

Learn Why Protecting Your Online Channels and Applications is Critical.

Tags : akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall
    
By: Akamai     Published Date: Jul 01, 2011

This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.

Tags : akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
By: Blue Coat Systems     Published Date: Jun 30, 2011

This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

Tags : blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus, application security, email security, hacker detection
    
By: ESET     Published Date: Jun 08, 2011

ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.

Tags : eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
    
By: ESET, LLC.     Published Date: May 16, 2011

Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.

Tags : eset, cybersecurity webinar, security manager, it security, anti spam, anti spyware, anti virus, internet security
    
By: TrendMicro     Published Date: May 09, 2011

The most effective approach for fighting Web threats will employ multiple layers of protection and incorporate a range of protective measures. Download this paper to learn more.

Tags : trendmicro, trend micro, web threat, protection, internet security, security management, web service security, data protection
    
By: WatchGuard Technologies     Published Date: Apr 20, 2011

This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!

Tags : watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor
    
By: WatchGuard Technologies     Published Date: Apr 20, 2011

Whether your data loss is accidental or malicious, you need to gain insight into the magnitude of your data loss problem, identify security gaps, and develop a proactive approach to stop data loss before it happens.

Tags : watchguard xcs, data loss protection, data loss prevention, data breach, content analysis, contextual analysis, dlp solution, network security appliance
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

How can an organization manage both their physical environment and their virtual environment without doubling up on the work, missing critical patches on offline virtual machines, or even missing patches on the virtual machines they are not even aware of?

Tags : shavlik, patch management, virtual machine, physical, network patching, lifecycle management, attack, risk
    
By: Google     Published Date: Apr 04, 2011

On demand version of this webinar. Today' s computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents

Tags : google, spam, malware, security, webinar, identity management, anti spam, anti virus
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End