Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 4155Sort Results By: Published Date | Title | Company Name
By: The Institute for Health Technology Transformation     Published Date: Sep 29, 2015

This summit is a unique learning opportunity and offers the ability to connect and be face-to-face with the nation's top HIT thought leaders. The discussions will feature thought leaders and industry experts. *Fee Required*

Tags : ny summit, health conference, latest trends, health events, heath technology, network management, storage management, compliance
By: Sage     Published Date: Aug 31, 2015

An Essential Guide to Protecting Your Sales, Profits and Brand.

Tags : sage, emv payments, credit card processing, processing terminals, data security standards, chargeback liability, security, it management
By: Silanis     Published Date: Aug 30, 2015

Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.

Tags : silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature
By: TigerText     Published Date: Aug 30, 2015

Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.

Tags : tigertext, tiger text, byod, hippa compliance, patient data, secure data, records management, hacker detection
By: Intralinks     Published Date: Aug 28, 2015

While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations.

Tags : security, it management, knowledge management, data management
By: Intralinks     Published Date: Aug 28, 2015

They say content is king. But if your content isn’t protected, it’s a king with no clothes.

Tags : security, it management, knowledge management, data management
By: Intralinks     Published Date: Aug 28, 2015

The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin?

Tags : security, it management, data management
By: Kaspersky     Published Date: Aug 27, 2015

Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.

Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget, network security, anti virus
By: Internap     Published Date: Aug 26, 2015

This white paper will focus on public cloud Infrastructure-as-a-Service (IaaS), including virtual and bare-metal cloud solutions.

Tags : public cloud infrastructure, iaas, bare metal cloud solution, virtual cloud solution, cloud computing, scalability, performance, legacy infrastructure
By: Google     Published Date: Aug 26, 2015

La mobilità e il cloud oggi sono considerate le tecnologie più critiche per il luogo di lavoro. Trasformano inoltre il ruolo del CIO perché l'IT diventa un partner strategico per il business e passa da strumento per l'implementazione a motore.

Tags : workplace innovation, google for work, mobility, personal technology, security, moving to the cloud, mobile computing, virtualization
By: Google     Published Date: Aug 26, 2015

Noi di Google ci impegniamo a sostenere questa idea, e non siamo certamente i soli. Milioni di organizzazioni (imprese di piccole e grandi dimensioni, scuole ed enti governativi) hanno già iniziato ad adottare l'approccio "nel lavoro come nella vita".

Tags : work the way you live, mobile workers, smartphones, productive employees, engaging employees, remote access, mobile computing, mobile data systems
By: Pluralsight     Published Date: Aug 20, 2015

OWASP Top 10 "The Big Picture" is all about understanding the top 10 web security risks we face on the web today in an easily consumable, well-structured fashion that aligns to the number one industry standard on the topic today.

Tags : web security risks, top 10 risks, security, top security risks, it management, internet security
By: AlienVault     Published Date: Aug 13, 2015

The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.

Tags : alienvault, security, siem, hacking, threat detection, monitoring, anti virus, application security
By: AlienVault     Published Date: Aug 13, 2015

Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

Tags : alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection
By: AlienVault     Published Date: Aug 13, 2015

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

Tags : alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection
By: Arcserve     Published Date: Aug 12, 2015

This survey provides insight into the Data Protection landscape across Asia Pacific. Most notably the results point to IT departments across APAC in a state of transition. While “legacy” methods for data protection are still heavily used, we see that a tipping point has been reached and in most instances the majority of users have moved to newer technologies in the data protection strategies.

Tags : data protection trends, arcserve, smb, data protection landscape, legacy data protection, data protection strategies, security, it management
By: Box     Published Date: Aug 11, 2015

This white paper reveals how CIOs are deploying an array of mobile content security technologies, giving them a robust platform upon which to build as their mobile usage expands.

Tags : mobility, mobile security, security technology, mobile for work, mobile, byod, cyod, endpoint
By: Venafi     Published Date: Aug 10, 2015

This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.

Tags : attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications, access control, anti spam
By: Venafi     Published Date: Aug 10, 2015

The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.

Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network, access control, anti spam
By: Venafi     Published Date: Aug 10, 2015

This whitepaper reveals how Security Operations teams can eliminate these outages.

Tags : security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection
By: Venafi     Published Date: Aug 10, 2015

This whitepaper reveals why enterprises are vulnerable to trust-based attacks.

Tags : cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity, anti spam, anti spyware
By: Venafi     Published Date: Aug 07, 2015

It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.

Tags : cyberattacks, security, cybercriminals, security application, access control, anti spam, anti spyware, anti virus
By: Venafi     Published Date: Aug 07, 2015

This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.

Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
By: Venafi     Published Date: Aug 07, 2015

Most organisations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative.

Tags : eliminate blind spots, ssl, security, security application, anti spam, anti spyware, anti virus, application security
By: Venafi     Published Date: Aug 07, 2015

Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.

Tags : pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security, anti spam, anti spyware
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.