Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 126 - 150 of 241Sort Results By: Published Date | Title | Company Name
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
By: Blue Coat Systems     Published Date: Jul 07, 2011

This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
By: Akamai     Published Date: Jul 01, 2011

Learn Why Protecting Your Online Channels and Applications is Critical.

Tags : akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall
By: Akamai     Published Date: Jul 01, 2011

This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.

Tags : akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
By: Blue Coat Systems     Published Date: Jun 30, 2011

This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

Tags : blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus, application security, email security, hacker detection
By: ESET     Published Date: Jun 08, 2011

ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.

Tags : eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
By: ESET, LLC.     Published Date: May 16, 2011

Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.

Tags : eset, cybersecurity webinar, security manager, it security, anti spam, anti spyware, anti virus, internet security
By: TrendMicro     Published Date: May 09, 2011

The most effective approach for fighting Web threats will employ multiple layers of protection and incorporate a range of protective measures. Download this paper to learn more.

Tags : trendmicro, trend micro, web threat, protection, internet security, security management, web service security, data protection
By: WatchGuard Technologies     Published Date: Apr 20, 2011

This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!

Tags : watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor
By: WatchGuard Technologies     Published Date: Apr 20, 2011

Whether your data loss is accidental or malicious, you need to gain insight into the magnitude of your data loss problem, identify security gaps, and develop a proactive approach to stop data loss before it happens.

Tags : watchguard xcs, data loss protection, data loss prevention, data breach, content analysis, contextual analysis, dlp solution, network security appliance
By: Shavlik Technologies     Published Date: Apr 14, 2011

How can an organization manage both their physical environment and their virtual environment without doubling up on the work, missing critical patches on offline virtual machines, or even missing patches on the virtual machines they are not even aware of?

Tags : shavlik, patch management, virtual machine, physical, network patching, lifecycle management, attack, risk
By: Google     Published Date: Apr 04, 2011

On demand version of this webinar. Today' s computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents

Tags : google, spam, malware, security, webinar, identity management, anti spam, anti virus
By: Globalsign Inc.     Published Date: Apr 01, 2011

This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.

Tags : globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
By: GFI Software     Published Date: Mar 31, 2011

In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.

Tags : gfi, sunbelt, messaging, web security best practices, threats, anti spam, anti spyware, anti virus
By: M86 Security     Published Date: Feb 08, 2011

This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.

Tags : m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
By: M86 Security     Published Date: Dec 01, 2010

This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.

Tags : m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement, anti spam
By: M86 Security     Published Date: Dec 01, 2010

This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.

Tags : m86 security, social media policy, web acceptable use policies, aups, email and web security, email security, security policies, web service security
By: Websense     Published Date: Sep 27, 2010

Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.

Tags : websense, social network, facebook, linkedin, twitter, data risk, data security, web security
By: SafeNet     Published Date: Sep 08, 2010

Don't let one of your customers become the next statistic. Give your customers an easy, safe and secure online banking experience.

Tags : safenet financial services, online banking, security, man-in-the-browser attacks, auditing, internet security, intrusion detection, intrusion prevention
By: SafeNet     Published Date: Sep 08, 2010

Find out about the most effective defense against MitB attacks.

Tags : safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle, mitm, security, auditing
By: Symantec.cloud     Published Date: Aug 10, 2010

This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.

Tags : messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering, web service security
By: IBM Software     Published Date: Aug 04, 2010

Learn how to you ensure that security standards are met as part of your quality measures.

Tags : ibm ouncelab, podcast, security software, secure software delivery, security, application security, internet security, security management
By: Symantec.cloud     Published Date: Jul 08, 2010

Keep email flowing in your business with email continuity.

Tags : messagelabs symantec, hosted email service, hosted messaging, web security services, email continuity, business continuity, email security, web service security
By: Symantec.cloud     Published Date: Jul 06, 2010

Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.

Tags : messagelabs symantec, web threat, malware, threat detection, web security services, anti spam, anti spyware, anti virus
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End