Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 101 - 125 of 249Sort Results By: Published Date | Title | Company Name
By: Bit9     Published Date: Sep 29, 2012

Download this case study to see how one convenience store chain uses Bit9 as a means of preventing unauthorized devices and applications from being used on its POC systems.

Tags : bit9, technology, retail, ecommerce, digital, online, security, online threats
    
By: Bit9     Published Date: Sep 29, 2012

Download Bit9's latest Threat Advisor and learn how adopting a positive, proactive, trust-based security model provides better application control, improving endpoint protection against advanced attacks while helping to prove compliance with PCI DSS requirements.

Tags : bit9, technology, retail, ecommerce, digital, online, security, online threats
    
By: Bit9     Published Date: Sep 29, 2012

Bit9 is the only company to stop Flame and the RSA attacks. Learn the techniques and approaches that modern attackers are using and why traditional defenses do not work. This webinar discusses the future of cyber attacks. We will get into various advanced persistant threats, how those relate to your own security posture, the tactics you might conisder. Download this on-demand webcast and join Bit9's CTO, Harry Sverdlove, as he explains how these attacks worked and what you can do to stop them.

Tags : bit9, technology, online, security, online threats, online security, internet security, security management
    
By: Websense     Published Date: Aug 23, 2012

"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.

Tags : phishing, web security, email security, phishing attacks, internet security, web service security
    
By: Websense     Published Date: Aug 23, 2012

This mobile security white paper outlines the essential steps for mobile security.

Tags : mobile security, websense, mobile device management, mdm, malware, anti spyware, security management, web service security
    
By: IBM     Published Date: Jul 13, 2012

As you move forward with your cloud initiative, it's critical to develop an effective resiliency management program so that your business remains protected in your new environment. This white paper discusses the key elements that make up a successful cloud-based strategy and examines the critical business areas and functions you'll need to assess.

Tags : ibm, technology, cloud, cloud computing, resiliency, business, white paper, web service security
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Gomez IT     Published Date: Dec 14, 2011

This whitepaper addresses the Web experience challenges companies must address when adopting the cloud. It offers perspective and best practices to assist in the evaluation of cloud providers and development of performance SLAs.

Tags : gomez, cloud computing, cloud risks, web, security, web management, security management, web service security
    
By: Webroot     Published Date: Dec 06, 2011

Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.

Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
By: Thawte     Published Date: Nov 08, 2011

Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, anti spam
    
By: Thawte     Published Date: Oct 31, 2011

Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.

Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!

Tags : webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
By: Thawte     Published Date: Oct 22, 2011

Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.

Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
    
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: EdgeWave     Published Date: Oct 15, 2011

Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.

Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.

Tags : application security, authentication, email security, high availability, identity management, internet security, intrusion detection, intrusion prevention
    
By: Secunia     Published Date: Oct 12, 2011

Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: CA Technologies     Published Date: Sep 29, 2011

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
By: CA Technologies     Published Date: Sep 29, 2011

Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.

Tags : risk, attack, security, business, access control, anti virus, application security, identity management
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End