Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 184Sort Results By: Published Date | Title | Company Name
By: Secunia     Published Date: Oct 12, 2011

This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.

Tags : application security, authentication, email security, high availability, identity management, internet security, intrusion detection, intrusion prevention
    
By: McAfee     Published Date: Dec 28, 2009

McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.

Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
By: Blue Coat Systems     Published Date: Jul 07, 2011

This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Blue Coat Systems     Published Date: Jun 30, 2011

This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

Tags : blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus, application security, email security, hacker detection
    
By: EdgeWave     Published Date: Oct 15, 2011

Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.

Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
By: MessageLabs     Published Date: Sep 17, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.

Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Websense     Published Date: Aug 23, 2012

This mobile security white paper outlines the essential steps for mobile security.

Tags : mobile security, websense, mobile device management, mdm, malware, anti spyware, security management, web service security
    
By: Adobe     Published Date: Nov 25, 2013

For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.

Tags : mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets
    
By: Akamai     Published Date: Jul 01, 2011

Learn Why Protecting Your Online Channels and Applications is Critical.

Tags : akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Reactivity     Published Date: Aug 21, 2009

Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.

Tags : network architecture, quality assurance, xml, web service management, web service, web service security, web services security, security appliance
    
By: Cenzic     Published Date: Nov 21, 2006

Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.

Tags : application security, web application security, hacker detection, cenzic, cenzic hailstorm, security, ip networks, network security
    
By: IBM     Published Date: Jun 16, 2009

Previously known as Watchfire AppScan, Rational® AppScan® Standard Edition V7.8 is a leading testing tool that scans and tests your Web applications for all common vulnerabilities. Download the trial to see how it automates the testing process so you can address problems early.

Tags : trial, appscan, watchfire, rational appscan, ibm, mmdg, testing, web application
    
By: Iovation     Published Date: Sep 25, 2009

After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.

Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading, application security, auditing
    
By: Neustar Inc.     Published Date: Oct 14, 2013

As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.

Tags : digital rights management, ip intelligence, best practices, neutar, security, wireless security, online content, rights
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to learn five key ways MFT makes a difference for your business.

Tags : seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: Bit9     Published Date: Sep 29, 2012

Download this whitepaper to learn how Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.

Tags : bit9, technology, online, security, online threats, online security, security management, security policies
    
By: Bit9     Published Date: Sep 29, 2012

Download Bit9's latest Threat Advisor and learn how adopting a positive, proactive, trust-based security model provides better application control, improving endpoint protection against advanced attacks while helping to prove compliance with PCI DSS requirements.

Tags : bit9, technology, retail, ecommerce, digital, online, security, online threats
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: CA Technologies     Published Date: Sep 29, 2011

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
By: Thawte     Published Date: Nov 08, 2011

Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage
    
By: GeoTrust     Published Date: Aug 09, 2013

Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : web security, web threats, ssl, secure sockets layer, technology, solution, security, web service security
    
By: Trend Micro SPN     Published Date: Nov 24, 2009

A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End