Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 229Sort Results By: Published Date | Title | Company Name
By: Secunia     Published Date: Oct 12, 2011

This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.

Tags : application security, authentication, email security, high availability, identity management, internet security, intrusion detection, intrusion prevention
    
By: McAfee     Published Date: Dec 28, 2009

McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.

Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
By: Blue Coat Systems     Published Date: Jul 07, 2011

This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Blue Coat Systems     Published Date: Jun 30, 2011

This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

Tags : blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus, application security, email security, hacker detection
    
By: Websense     Published Date: Jul 08, 2014

This paper provides 5 essentials for protecting against advanced persistent threats (APTS)

Tags : apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
By: EdgeWave     Published Date: Oct 15, 2011

Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.

Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
By: MessageLabs     Published Date: Sep 17, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.

Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Websense     Published Date: Aug 23, 2012

This mobile security white paper outlines the essential steps for mobile security.

Tags : mobile security, websense, mobile device management, mdm, malware, anti spyware, security management, web service security
    
By: Adobe     Published Date: Nov 25, 2013

For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.

Tags : mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets
    
By: Akamai     Published Date: Jul 01, 2011

Learn Why Protecting Your Online Channels and Applications is Critical.

Tags : akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Reactivity     Published Date: Aug 21, 2009

Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.

Tags : network architecture, quality assurance, xml, web service management, web service, web service security, web services security, security appliance
    
By: Cenzic     Published Date: Nov 21, 2006

Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.

Tags : application security, web application security, hacker detection, cenzic, cenzic hailstorm, security, ip networks, network security
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: IBM     Published Date: Jun 16, 2009

Previously known as Watchfire AppScan, Rational® AppScan® Standard Edition V7.8 is a leading testing tool that scans and tests your Web applications for all common vulnerabilities. Download the trial to see how it automates the testing process so you can address problems early.

Tags : trial, appscan, watchfire, rational appscan, ibm, mmdg, testing, web application
    
By: Iovation     Published Date: Sep 25, 2009

After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.

Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading, application security, auditing
    
By: Neustar Inc.     Published Date: Oct 14, 2013

As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.

Tags : digital rights management, ip intelligence, best practices, neutar, security, wireless security, online content, rights
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to learn five key ways MFT makes a difference for your business.

Tags : seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: Bit9     Published Date: Sep 29, 2012

Download this whitepaper to learn how Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.

Tags : bit9, technology, online, security, online threats, online security, security management, security policies
    
By: Bit9     Published Date: Sep 29, 2012

Download Bit9's latest Threat Advisor and learn how adopting a positive, proactive, trust-based security model provides better application control, improving endpoint protection against advanced attacks while helping to prove compliance with PCI DSS requirements.

Tags : bit9, technology, retail, ecommerce, digital, online, security, online threats
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app.

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, enterprise applications, web service security, mobile computing
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End