Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3533Sort Results By: Published Date | Title | Company Name
By: Qualcomm     Published Date: Jan 27, 2015

In this Gigaom Research webinar, we will discuss the technologies that will enable this perceptive intelligence. We will also evaluate the long-term future and provide advice to technologists and manufacturers looking to participate in the coming era of device intelligence.

Tags : qualcomm, mobile devices, smart phones, device intelligence, business intelligence, predictive analytics, mobile phones, mobile computing
    
By: Verisign     Published Date: Jan 22, 2015

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics, DDoS malicious code analysis and behavioral trends

Tags : service trends report, ddos, security research, it security analytics, ssdp vulnerability, security, it management, data management
    
By: Verisign     Published Date: Jan 22, 2015

Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.

Tags : ddos protection, cyber security threats, cloud-based protection, best practices, security, it management, enterprise applications, data management
    
By: Verisign     Published Date: Jan 22, 2015

To tackle the advanced DDoS threats of today and tomorrow, it is increasingly clear that cloud DDoS mitigation providers must rapidly innovate solutions and implement them quickly on a global scale. To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena. This technical report describes the Athena platform, a globally distributed DDoS mitigation system that provides comprehensive protection against network- and application-layer attacks, and specializes in mitigating Layer-7 and Secure Sockets Layer (SSL)-based attacks

Tags : mitigation platform, ddos threats, internet infrastructure, ssl based attacks, application-layer attacks, security, it management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

Download this important report and learn why utilizing the expertise and resources of a cloud-based provider is the only sound solution.

Tags : cloud defenses, ddos attacks, cloud-based provider, cyber attacks, security, it management, knowledge management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.

Tags : api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation, security, it management, knowledge management
    
By: Verisign     Published Date: Jan 22, 2015

Distributed Denial of Service (DDoS) attacks are a threat to businesses worldwide and the attacks are getting larger and more sophisticated. The industry’s approach to protecting against DDoS attacks must change, and change fundamentally, to stay ahead of this growing threat. Read this blog today to find out how to stay ahead of these attacks!

Tags : ddos, ddos attacks, it security risk, risk mitigation, security, it management, knowledge management, enterprise applications
    
By: Cisco     Published Date: Jan 21, 2015

Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.

Tags : cisco, surveillance, ip-enabled, devices, data, integration, iot, business
    
By: Cisco     Published Date: Jan 21, 2015

Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.

Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
By: Cisco     Published Date: Jan 21, 2015

The latest version of the Medianet-enabled Video Surveillance Manager (VSM) now runs on the Cisco Unified Computing System. Scale and reliability are redefined as Intelligent Networked Surveillance has come of age. VSM 7 and MediaNet have completely changed how this is deployed and operated.

Tags : cisco, vsm, surveillance, manager, unified, computing, system, scale
    
By: Cisco     Published Date: Jan 21, 2015

Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.

Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
By: Cisco     Published Date: Jan 21, 2015

Everyone should be able to communicate from any device - especially in an emergency situation. The Cisco IP Interoperability and Collaboration Solution (IPICS) brings this capability to ANY organization without anyone having to purchase new or unique devices. In this clip we build a fully functional network on set to see exactly how this works, even using an iPad to communicate to a hand held radio.

Tags : cisco, ipics, interoperability, collaboration, solution, device, emergency, intelligence
    
By: McAfee     Published Date: Jan 20, 2015

Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security. Nearly half of IT professionals report they continue to make this tradeoff, and if you believe our experts, that number is being under-reported based on what they’re seeing.

Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, security
    
By: McAfee     Published Date: Jan 20, 2015

Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Jan 20, 2015

This report discusses how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, security
    
By: McAfee     Published Date: Jan 20, 2015

Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.

Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
    
By: McAfee     Published Date: Jan 20, 2015

With networks sprawling to massive proportions and malicious activity constantly evolving, situational awareness is more vital than ever in keeping your network secure. But it’s not built on skills alone. Eight tools are equally as essential for keeping your situational awareness—and your network—alive.

Tags : situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, security
    
By: McAfee     Published Date: Jan 20, 2015

Enterprises worldwide rely on network high availability for business continuity. Find out how the capabilities that are part of your next-generation firewall can help ensure that your network is up and running all day, every day.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Jan 20, 2015

It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security
    
By: McAfee     Published Date: Jan 20, 2015

Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.

Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
By: McAfee     Published Date: Jan 20, 2015

Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security.

Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, anti spyware, anti virus, firewalls, internet security
    
By: McAfee     Published Date: Jan 20, 2015

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Jan 20, 2015

CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.

Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, networking, firewalls, internet security
    
By: McAfee     Published Date: Jan 20, 2015

Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.

Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, networking
    
By: McAfee     Published Date: Jan 20, 2015

The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.

Tags : situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, networking
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.