Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 126 - 150 of 202Sort Results By: Published Date | Title | Company Name
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control
    
By: Qualys     Published Date: Feb 22, 2010

This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.

Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
By: Websense     Published Date: Feb 16, 2010

This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.

Tags : tco, websense, web security, osterman, hybrid, security solutions, security management, security policies
    
By: Symantec.cloud     Published Date: Feb 12, 2010

IT security needs to work seamlessly across email, web & IM to protect against the latest Converged Threats - FREE Whitepaper

Tags : messagelabs, symantec hosted services, converged threat, it security, web security, malware, messagelabs security safeguard, internet security
    
By: Mimecast     Published Date: Feb 05, 2010

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security
    
By: Symantec.cloud     Published Date: Feb 03, 2010

The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.

Tags : messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
    
By: McAfee     Published Date: Dec 28, 2009

McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.

Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
By: McAfee     Published Date: Dec 09, 2009

Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.

Tags : mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
    
By: Trend Micro, Inc.     Published Date: Nov 25, 2009

The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.

Tags : trend, trend micro, webcast, security, hitrust, web, privacy, ehrs
    
By: Trend Micro SPN     Published Date: Nov 24, 2009

A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: Webroot UK     Published Date: Nov 11, 2009

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration
    
By: Webroot UK     Published Date: Nov 11, 2009

The software-as-a-service model can help you stay ahead of Web and email threats without breaking the bank on infrastructure and management. Find out more in this whitepaper.

Tags : webroot, saas, software-as-a-service, web security, email security, threats, storage management, tco
    
By: Webroot UK     Published Date: Nov 11, 2009

Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!

Tags : webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention
    
By: Webroot UK     Published Date: Nov 11, 2009

This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.

Tags : webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp
    
By: Webroot UK     Published Date: Nov 11, 2009

Service Subscription Takes the Headache Out of Email and Web Threat Management. Read this white paper about the Seven Reasons to Adopt SaaS Security.

Tags : webroot, security saas, web security, email security, security management, internet security, web service security, total cost of ownership
    
By: Iovation     Published Date: Sep 25, 2009

Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.

Tags : software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules
    
By: Iovation     Published Date: Sep 25, 2009

Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.

Tags : iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies
    
By: Iovation     Published Date: Sep 25, 2009

This white paper will help you understand what new and innovative techniques can be used to protect the reputation of your business and keep your members in a safe and trusted environment, while keeping the fraudsters out.

Tags : online dating, online community fraud and abuse, low false positives, pattern matching, web device print, download device print, pattern matching and risk assessment, forensic analysis
    
By: Iovation     Published Date: Sep 25, 2009

Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.

Tags : cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks, cheating, collusion and money laundering, buy
    
By: Iovation     Published Date: Sep 25, 2009

One of the world's largest MMORPG publishers uses iovation to keep their games safe for their valued players, and the fraudsters out.

Tags : iovation, mmorpg, reputationmanager, online game development and publishing, trickster online revolution, grand chase and pangya, player violations of terms of service, spam
    
By: Iovation     Published Date: Sep 25, 2009

One of the leading and fastest growing suppliers of systems for online betting, casino, poker and bingo uses iovation to combat online fraud and abuse.

Tags : online betting, casino, poker and bingo, combat online fraud and abuse, fraud solution, false positives, iovation reputationmanager, device reputation
    
By: Iovation     Published Date: Sep 25, 2009

After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.

Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading, application security, auditing
    
By: Iovation     Published Date: Sep 25, 2009

ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.

Tags : iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process
    
By: IBM     Published Date: Sep 10, 2009

Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!

Tags : ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities
    
By: Trend Micro SaaS     Published Date: Sep 01, 2009

This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End