Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3978Sort Results By: Published Date | Title | Company Name
By: Duo Security - Nethawk     Published Date: Jul 01, 2015

Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).

Tags : two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
By: Duo Security - Nethawk     Published Date: Jul 01, 2015

Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.

Tags : two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
By: CDW     Published Date: Jun 30, 2015

See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.

Tags : mobility, apps, strategy, platform, emm, risk management, productivity, monitoring
    
By: OnBase by Hyland     Published Date: Jun 29, 2015

Unstructured content annoys clinicians and staff. They have to find it. They have to wait for it. They have to worry about whether it’s been lost or misplaced. Turn that source of annoyance into a point of efficiency with enterprise content management (ECM) technology. Learn how to find your unstructured content, capture it and make it work for you.

Tags : user experience, enterprise content management, productivity, security, compliance, it management, enterprise applications
    
By: OnBase by Hyland     Published Date: Jun 29, 2015

With so many enterprise content management (ECM) vendors, choosing one can be overwhelming. Learn how to research ECM vendors, use the RFP process to narrow the playing field and evaluate not only the software, but also the vendor, in a product demo. Read on to ensure you pick the solution and vendor best-suited to meet your organization’s specific needs.

Tags : enterprise content management, ecm, vendors, magic quadrant, security, it management, enterprise applications
    
By: OnBase by Hyland     Published Date: Jun 29, 2015

Clinicians and staff want to perform better, produce more and enjoy higher levels of satisfaction. Close the gap between a user’s experiences with technology as a consumer and her experiences with technology at work to maximize the impact on your organization’s bottom line.

Tags : healthcare it, roi, optimization, return of investment, security, it management, enterprise applications
    
By: OnBase by Hyland     Published Date: Jun 29, 2015

Manage medical imaging and documentation better by presenting patient information – in context – in one location. Read on to see how a flexible, enterprise patient viewer helps healthcare IT ensure patient and clinician satisfaction while supporting the market’s healthcare delivery and payment system initiatives.

Tags : medical imaging, patient information, enterprise patient viewer, healthcare it, security, it management, enterprise applications
    
By: Cisco     Published Date: Jun 29, 2015

Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?

Tags : cisco, cisco aci, technology, security, data center, apic, security data, cio
    
By: Cisco     Published Date: Jun 29, 2015

Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.

Tags : csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation, network architecture
    
By: Mimecast     Published Date: Jun 25, 2015

In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.

Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
    
By: Cisco     Published Date: Jun 25, 2015

This paper will help you get started with Software Defined Architecture in Several ways, depending on where you are in your journey.

Tags : sdn, cisco, cisco aci, software defined architecture, automation, networks, servers, security
    
By: Cisco     Published Date: Jun 24, 2015

This paper explores the main benefits of Cisco ACI Security.

Tags : cisco aci security, csico, virtualization, integration, security, application integration, data center, ynified
    
By: Mimecast     Published Date: Jun 22, 2015

Download this whitepaper today and take a good hard look at one of the biggest threats companies are facing – without preparation your company could be next.

Tags : spear-phising, cyber attacks, cyber threats, network security, company security, application security, business continuity, disaster recovery
    
By: Mimecast     Published Date: Jun 22, 2015

Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management
    
By: ZirMED     Published Date: Jun 22, 2015

Read this healthcare providers' guide for expertise on effective revenue cycle management and long-term financial forecasting.

Tags : zirmed, cycle management, revnue, compliance, hippa, it spending, it budget, total cost of ownership
    
By: Mimecast     Published Date: Jun 22, 2015

So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:

Tags : microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks, networking, disaster recovery
    
By: Mimecast     Published Date: Jun 22, 2015

To find out if your data is being put at risk, get practical advice on how to eliminate this risk, and find out which vendor hits the ‘Bloor Bullseye’.

Tags : file sharing security, file sharing services, best practices, storage services, email security, security management, business intelligence, collaboration
    
By: Mimecast     Published Date: Jun 22, 2015

Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, email security, email archiving, data loss prevention
    
By: Mimecast     Published Date: Jun 22, 2015

Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying its Unified Email Management solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.

Tags : testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals the reason why people love E2E tests.

Tags : end to end testing, testing, test, e2e testing, manual testing, it landscapes, test environment, e2e tests
    
By: Nexgate     Published Date: Jun 17, 2015

This report will outline a framework for assigning roles and responsibilities to manage social media risk.

Tags : proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: IBM     Published Date: Jun 16, 2015

This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.

Tags : data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.