Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3920Sort Results By: Published Date | Title | Company Name
By: Data Center Knowledge     Published Date: Jun 17, 2015

This webinar will explore business considerations such as accelerating deployment, leveraging existing Active Directory - based authentication and simplifying access with single-sign-on for business and privileged users.

Tags : centrify, hadoop, security, compliance, infrastructure, data center, big data, network architecture
    
By: Mimecast     Published Date: May 27, 2015

White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.

Tags : mimecast, migration, microsoft office 365, storage, cloud backup, security, it management, data protection
    
By: ThreatTrack Security     Published Date: May 26, 2015

Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”

Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.

Tags : phishing, next-generation malware, security, email, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.

Tags : cyberthreat, security, malware, defense, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.

Tags : advanced protection, cyberthreat, security, incident response team, threatsecure, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this white paper to learn how to add value through malware analysis.

Tags : malware, security threat, cyberattack, cyberthreat, malware analysis, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.

Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar to learn how to win the battle against Advanced Persistent Threats.

Tags : persistent threats, cyberattacks, security, data breach, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.

Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.

Tags : threattrack, cyber security, attacks, protection, security
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks

Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
By: Acronis EMEA     Published Date: May 19, 2015

Download this paper to uncover the steps needed to mobilise your workforce and become more productive.

Tags : mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access
    
By: Acronis EMEA     Published Date: May 19, 2015

This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.

Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
    
By: Acronis EMEA     Published Date: May 19, 2015

The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.

Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device
    
By: Acronis EMEA     Published Date: May 19, 2015

This case study explores how Acronis Access changed the way Parrish Construction Group communicates.

Tags : build a mobile workforce, control access, share documents, security, acronis access solution, acronis, access to documents, mobility
    
By: Pluralsight     Published Date: May 18, 2015

Arm your developer team with the information presented in our free course: Web Security and the OWASP Top 10: The Big Picture. In this course, Microsoft MVP and security guru Troy Hunt tells you the necessary steps to take to protect your organization. -Top 10 security risks -Security misconfiguration -Sensitive data exposure -Broken authentication and session management

Tags : web security, security, data, xss, scripting, csrf. pluralsight
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this datasheet to discover the main benefits of Acronis Access Advanced.

Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
    
By: Intel Security     Published Date: May 15, 2015

Intel Security has produced a comprehensive guide to help you evaluate the risks and options for securing your business whichever path you choose.

Tags : windows server support, end of windows support, intel security, security
    
By: Intel Security     Published Date: May 15, 2015

Your physical and virtualized server instances will be vulnerable to any new security threats. Download this how-to guide and start preparing for Windows Server 2003 end of support.

Tags : windows server 2003 eos, vulnerability to security threats, windows end of support, security
    
By: Intel Security     Published Date: May 15, 2015

Intel Security offers solutions to meet each need. Download this quick guide and learn your options.

Tags : windows 2003 eos, end of support for windows, windows security challenges, security
    
By: Seagate Technology     Published Date: May 15, 2015

An inside look at how IT Executives and System Integrators are managing video surveillance data.

Tags : system integrators, enterprise it, video surveillance, knowledge management, ip networks, biometrics, intrusion detection, mobile data systems
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Cisco     Published Date: May 14, 2015

The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.

Tags : hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.