Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3262Sort Results By: Published Date | Title | Company Name
By: Radix FZC     Published Date: Sep 10, 2014

Watch this Live Event on Wednesday September 10th at 2pm EST to learn how you can start using .host, and engage its key benefits to give you a branding and marketing edge.

Tags : radix, radix registry, icann, .host, global hosting, web hosting, doman name, ebusiness
    
By: SilverSky     Published Date: Aug 27, 2014

Learn how your company can increase their security by adopting this holistic approach.

Tags : silversky, security, targeted attacks, retail security, security infrastructure, detection, zoning, network security
    
By: Neustar     Published Date: Aug 27, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property.

Tags : ddos attacks, it security, data breaches, ddos impact report, application security, ddos, security management
    
By: Workday     Published Date: Aug 27, 2014

This paper provides a clear insight into the real SaaS manifesto

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, knowledge management, enterprise applications, storage
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will help you navigate the virtualization solutions available and explain how Hyper-V can benefit you.

Tags : backup, high availability, disaster recovery, virtualization software, hyper-v, backup and recovery, clustering, network attached storage
    
By: Vision Solutions     Published Date: Aug 26, 2014

This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.

Tags : systems migrations, business downtime, system migration, business continuity, vision solutions, storage virtualization, disaster recovery, high availability
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will lead you through 3 essential steps to help ensure business continuity and survival.

Tags : guide to recovery, business continuity, disaster recovery, downtime, business impact of downtime, system migration, system upgrading, vision solutions technology
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper explores the market leading solutions available for data protection and recoverability.

Tags : data protection, data recovery, geocluster, data cluster. failover clustering, storage, backup and recovery, clustering, storage management
    
By: Riverbed     Published Date: Aug 22, 2014

Businesses rely on SharePoint availability and performance. This infographic shows the impact of SharePoint slowdowns, challenges with delivering SharePoint and recommendations for an effective SharePoint deployment.

Tags : business performance, sharepoint availability, performance, challenges, delivery, recommendation, effective, deployment
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

The limitations of traditional three-tier campus network architectures are being severely tested by peer-centered, wired/wireless, multi-device, and multi-application environments running rich media like streaming video and audio.These legacy networks are inflexible, inefficient, and have high OpEx costs.1

Tags : campus networks, wired, wireless, multi-device, multi-application, rich media, limitations, three-tier
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

The security of your campus network is essential to managing your organization's risk - and unlike the networking infrastructure of third-part service providers, the responsibility for campus network security falls primarily on your own organization. This report explains why security for your campus network is essential, and outlines three straightforward ways that you can improve it.

Tags : security, campus network, network, infrastructure, risk, service providers, networking, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

This white paper explores today's campus networking environment: its operational shortcomings and potential to address knowledge workers' growing needs. IT managers need to look to their near- and midterm future needs in terms of how a software-defined network architecture can provide incremental value to their IT and network infrastructure; why it is likely to be the foundation of next-generation enterprise networking solutions; the importance of open technologies and protocols such as OpenFlow; and how SDN will help better manage physical and virtual network resources to deliver a better application experience.

Tags : enterprise, campus network, sdn it, virtual, network architecture, networking, security, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

For the last two years, Software-Defined Networking (SDN) has been the hottest topic in networking. There is tremendous interest in SDN on the part of vendors and a wide range of user groups including hyper-scale data center providers, service providers and enterprises of all types and sizes. While most of the discussion of SDN focuses on its use in the data center, The 2013 Guide to Network Virtualization and SDN1 highlights the fact that enterprise IT organizations are interested in deploying SDN broadly throughout their environment, including in their WAN and campus networks.

Tags : security, hyper-scale, sdn, campus networks, wan, networking, it management
    
By: McAfee     Published Date: Aug 21, 2014

Uma rede privada virtual (VPN, Virtual Private Network) proporciona o melhor retorno do investimento em proteção de comunicações. Porém, a falta de confiabilidade nos links da VPN é um fator de risco para comunicações críticas dentro das organizações. As redes constantemente disponíveis dependem de diversos provedores de serviços de Internet para garantir conectividade permanente e maior largura de banda. A aVPN (Augmented VPN) agrega todos os links dos provedores de serviços de Internet para disponibilizar um único túnel de alta capacidade. A aVPN é um modo simples e econômico de criar conexões rápidas, seguras e de alta capacidade entre sites, bem como garantir uma conectividade sem interrupções. Ela foi desenvolvida pensando na facilidade de uso e sua implementação não exige equipamentos/softwares especiais ou contratos de troca de tráfego com provedores de serviços de Internet.

Tags : vpn, rede privada virtual, firewall de próxima geração, mpls, bgp, vpn de alta disponibilidade, segurança, gerenciamento de ti
    
By: Vision Solutions     Published Date: Aug 21, 2014

A report on research findings into the state of resilience and methods used companies to ensure their strength.

Tags : data management strategies, data protection, system migrations, data safeguarding, backup and recovery, clustering, business continuity, disaster recovery
    
By: OpenText     Published Date: Aug 19, 2014

Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.

Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management
    
By: OpenText     Published Date: Aug 19, 2014

While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.

Tags : opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, security, knowledge management
    
By: OpenText     Published Date: Aug 19, 2014

Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.

Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app.

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.