Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 126 - 150 of 184Sort Results By: Published Date | Title | Company Name
By: Iovation     Published Date: Sep 25, 2009

One of the world's largest MMORPG publishers uses iovation to keep their games safe for their valued players, and the fraudsters out.

Tags : iovation, mmorpg, reputationmanager, online game development and publishing, trickster online revolution, grand chase and pangya, player violations of terms of service, spam
    
By: Iovation     Published Date: Sep 25, 2009

One of the leading and fastest growing suppliers of systems for online betting, casino, poker and bingo uses iovation to combat online fraud and abuse.

Tags : online betting, casino, poker and bingo, combat online fraud and abuse, fraud solution, false positives, iovation reputationmanager, device reputation
    
By: Iovation     Published Date: Sep 25, 2009

After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.

Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading, application security, auditing
    
By: Iovation     Published Date: Sep 25, 2009

ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.

Tags : iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process
    
By: IBM     Published Date: Sep 10, 2009

Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!

Tags : ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities
    
By: Trend Micro SaaS     Published Date: Sep 01, 2009

This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
By: IBM     Published Date: Jun 16, 2009

Previously known as Watchfire AppScan, Rational® AppScan® Standard Edition V7.8 is a leading testing tool that scans and tests your Web applications for all common vulnerabilities. Download the trial to see how it automates the testing process so you can address problems early.

Tags : trial, appscan, watchfire, rational appscan, ibm, mmdg, testing, web application
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
By: Mimecast     Published Date: Mar 31, 2009

The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc
    
By: Trend Micro SaaS     Published Date: Oct 08, 2008

According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: MessageLabs     Published Date: Sep 17, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.

Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
    
By: Black Lotus     Published Date: Jan 16, 2014

Learn how Black Lotus collected data on the highly publicized @DerpTrolling attacks, a new DDoS mitigation vector which uses network time protocol (NTP) reflection to amplify malicious data.

Tags : firewalls, hacker detection, intrusion detection, phishing, web service security, data protection
    
By: Varonis     Published Date: Nov 12, 2013

Verizonís longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection.

Tags : varonis, medical insurer, mortgage lender, retailer, data breach investigations report, dbir, larger trends, security
    
By: IBM     Published Date: Jan 25, 2013

Educating Everyone To Guard the Cloud

Tags : security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
By: IBM     Published Date: Jan 25, 2013

IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.

Tags : security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
By: Equinix     Published Date: Jul 31, 2012

Learn how the company reduced costs, achieved LAN-speed latency with AWS, increased application performance, and improved customer experience. The added ability to expand to locations not served by public cloud provided added strategic advantage.

Tags : equinix, security, colo, lan, speed, latency, badgeville, public
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: ESET     Published Date: Jun 20, 2011

Trusted experts in endpoint security solutions. Learn more today!

Tags : cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows
    
By: ESET, LLC.     Published Date: May 16, 2011

Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.

Tags : eset, global threat report, april 2011, 419, scam, cybercrime, anti spam, anti spyware
    
By: Symantec.cloud     Published Date: Apr 14, 2011

In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.

Tags : symantec cloud, messaging, web security best practices, malware, anti spam, anti spyware, anti virus, web service security
    
By: Qualys     Published Date: Apr 05, 2011

To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.

Tags : web application security, qualys, vulnerabilities, sql injection, ssi injection, xpath injection, attacks, qualysguard was 2.0
    
By: Kingston     Published Date: Feb 15, 2011

Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization

Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory
    
Start   Previous    1 2 3 4 5 6 7 8    Next    End