Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 126 - 150 of 223Sort Results By: Published Date | Title | Company Name
By: Websense     Published Date: Sep 27, 2010

Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.

Tags : websense, social network, facebook, linkedin, twitter, data risk, data security, web security
    
By: SafeNet     Published Date: Sep 08, 2010

Don't let one of your customers become the next statistic. Give your customers an easy, safe and secure online banking experience.

Tags : safenet financial services, online banking, security, man-in-the-browser attacks, auditing, internet security, intrusion detection, intrusion prevention
    
By: SafeNet     Published Date: Sep 08, 2010

Find out about the most effective defense against MitB attacks.

Tags : safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle, mitm, security, auditing
    
By: Symantec.cloud     Published Date: Aug 10, 2010

This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.

Tags : messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering, web service security
    
By: IBM Software     Published Date: Aug 04, 2010

Learn how to you ensure that security standards are met as part of your quality measures.

Tags : ibm ouncelab, podcast, security software, secure software delivery, security, application security, internet security, security management
    
By: Symantec.cloud     Published Date: Jul 08, 2010

Keep email flowing in your business with email continuity.

Tags : messagelabs symantec, hosted email service, hosted messaging, web security services, email continuity, business continuity, email security, web service security
    
By: Symantec.cloud     Published Date: Jul 06, 2010

Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.

Tags : messagelabs symantec, web threat, malware, threat detection, web security services, anti spam, anti spyware, anti virus
    
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.

Tags : messagelabs symantec, web threat, security safeguard, malware, web security services, anti spam, anti spyware, anti virus
    
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

Read our latest whitepaper & create a step-by-step approach to IT security that will work for your business.

Tags : messagelabs symantec, it security, malware, security management, anti spam, anti spyware, anti virus, internet security
    
By: Symantec.cloud     Published Date: Apr 27, 2010

We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.

Tags : messagelabs symantec, web security threat, malware, bandwidth, bandwidth management, anti spam, anti spyware, anti virus
    
By: Symantec.cloud     Published Date: Apr 27, 2010

Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.

Tags : messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard, anti spam, anti spyware, anti virus
    
By: Proofpoint     Published Date: Apr 22, 2010

This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.

Tags : proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email, internet security
    
By: Websense     Published Date: Apr 16, 2010

Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.

Tags : websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways
    
By: Symantec.cloud     Published Date: Apr 15, 2010

Keeping email secure and available is a complex and daunting task. Learn how a hosted solution can provide secure and available email

Tags : messagelabs symantec hosted services, email, security, botnets, anti virus, email security, web service security
    
By: Symantec.cloud     Published Date: Apr 15, 2010

Keeping email, web, and IM secure is a complex and daunting task. Learn how a hosted solution can provide security and available communications.

Tags : messagelabs symantec hosted services, email, security, web security, email security, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

Move protection to where the threats are managing web-borne threats is becoming a major headache for today's resource-strapped organizations.

Tags : webroot, web security, cloud-based computing, malware, threat protection, data security, anti spyware, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

By using a service based in the cloud, protection against threats is brought nearer to where those threats are located, making it easier and more effective to protect users against security threats such as malware.

Tags : webroot, cloud-based service, web security, malware, security threat, anti spyware, web service security, cloud computing
    
By: Webroot UK     Published Date: Mar 22, 2010

This paper examines the realities of web threats and looks at the promise that cloud-based solutions bring for organisations in terms of providing a higher level of protection against the increasingly complex and sophisticated threats being seen today.

Tags : webroot, web security, cloud computing, malware threats, anti spam, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, remote access, malware, viruses, spyware, phishing, threat protection
    
By: Webroot UK     Published Date: Mar 22, 2010

The web today is a prime vector for attack. Interrupting information flows, which are increasingly transmitted over the internet, has become the prime focus for today's financially motivated hackers.

Tags : webroot, web security protection, hackers, web threats, cloud computing, malware, anti spyware, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats

Tags : webroot, web security service, cloud computing, web threats, business process automation, anti spam, anti spyware, anti virus
    
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control
    
By: Qualys     Published Date: Feb 22, 2010

This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.

Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
By: Websense     Published Date: Feb 16, 2010

This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.

Tags : tco, websense, web security, osterman, hybrid, security solutions, security management, security policies
    
By: Symantec.cloud     Published Date: Feb 12, 2010

IT security needs to work seamlessly across email, web & IM to protect against the latest Converged Threats - FREE Whitepaper

Tags : messagelabs, symantec hosted services, converged threat, it security, web security, malware, messagelabs security safeguard, internet security
    
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End