Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3646Sort Results By: Published Date | Title | Company Name
By: destinationCRM.com     Published Date: Apr 15, 2015

It's no secret that the use smart phones is exploding. According to a recent report from the Pew Research Center, 34% Americans go online mostly using their phones, and not using some other device such as a desktop or laptop computer. The implication for location based marketing and ecommerce, customer service, and personalized, permission based marketing is enormous, but the rules of engagement are markedly different for mobile communications.

Tags : mobile data, customer engagement, crm, customer data, smartphones, mobile communications, mobile data systems, smart phones
    
By: IBM     Published Date: Feb 24, 2015

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

Tags : ibm, data discovery, data classification, big data, risk mitigation, security, it management, data management
    
By: Okta     Published Date: Feb 24, 2015

With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.

Tags : identity and access management, saas applications, single sign-on, active directory, management solutions, access control, identity management
    
By: Okta     Published Date: Feb 24, 2015

Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.

Tags : identity and access management, idaas, service providers, multiple use, vendor evaluation, identity management
    
By: Okta     Published Date: Feb 24, 2015

This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.

Tags : identity and access management, security and risk, extended enterprise, it trends, business agility, identity management
    
By: Okta     Published Date: Feb 24, 2015

Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.

Tags : identity and mobility management, office 365, cloud, maximum user adoption, identity management
    
By: BitSight Technologies     Published Date: Feb 20, 2015

Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.

Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
By: Bit9     Published Date: Feb 20, 2015

You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise. Bit9 + Carbon Black reached out to a series of experts to collect their thoughts and advice on dealing with data security incidents or breaches.

Tags : breach preparation, data breaches, bit9, it data security, security, it management, enterprise applications, business intelligence
    
By: Bit9     Published Date: Feb 20, 2015

Businesses need to view security as a process and leverage solutions that can proactively collect data, apply aggregated threat intelligence, reduce the cost and complexity of incident response and evolve, adapt and learn from your investigation. This eGuide will cover how a continuous approach to response can resolve these challenges and put your organization in a better security posture by proactively preparing for a breach.

Tags : it threat intelligence, aggregated data, bit9, security solutions, incident response, security, it management, enterprise applications
    
By: Bit9     Published Date: Feb 20, 2015

Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute’s latest industry survey to understand these key findings.

Tags : endpoint data, bit9, ir capabilities, siem integration tools, security, it management, enterprise applications, business intelligence
    
By: Bit9     Published Date: Feb 20, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced attacks, bit9, endpoint data, it threat intelligence, it security solutions, security, it management, enterprise applications
    
By: Docusign     Published Date: Feb 19, 2015

La société américaine DocuSign, spécialiste des outils de signature électronique, permet des signatures numériques conformes aux normes de l'Union Européenne et va permettre à un plus grand nombre d’entreprises d’accéder plus vite aux avantages d’une activité 100% numérique avec des transactions dans le cloud rapides et sécurisées.

Tags : docusign sécurise, signature électronique, security
    
By: Docusign     Published Date: Feb 19, 2015

À cause du nombre croissant de professionnels qui utilisent les téléphones et applications mobiles, la « vague mobile » a des incidences sur chaque fonction commerciale dans le monde entier et modifie la manière de faire des affaires. Les technologies telles que les signatures électroniques mobiles peuvent aider les entreprises à finaliser leurs transactions commerciales. Les signatures électroniques mobiles vous permettent, ainsi qu'à vos contacts, d'envoyer et de signer des documents légalement, grâce aux téléphones et à d'autres appareils mobiles, à tout moment et en tout lieu.

Tags : docusign, la signature electronique, compliance
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. Read this whitepaper to learn how your organization can properly embrace a higher security posture to protect SSL.

Tags : ssl, cryptographic protocols, data security, higher security posture, security, it management, data management
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.

Tags : esignature technologies, mcafee, salesforce, linkedin, esignature solutions, authentication, identity management, return on investment
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the EU e-signature law and the benefits of knowing about this law for the business.

Tags : esignature law, electronic signature technology laws, eu esignature law, docusign, identifying the signer, identification signer, authentication, identity management
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, access control, application security
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, application security, authentication
    
By: IBM     Published Date: Feb 11, 2015

IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.

Tags : application security testing, application security, ibm, iast, binary code, security, it management, business intelligence
    
By: IBM     Published Date: Feb 11, 2015

IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

Tags : ibm security, business-centric strategies, security solutions, it policies, security, it management, business intelligence, business management
    
By: IBM     Published Date: Feb 11, 2015

IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.

Tags : security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security, business intelligence, risk management
    
By: IBM     Published Date: Feb 11, 2015

IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.

Tags : ibm security, access management solutions, mobile channel security, advanced threats, byod, security, it management, mobile data systems
    
By: IBM     Published Date: Feb 11, 2015

Strengthen application protection—from design to deployment—to proactively address cloud security risks.

Tags : cloud environment, web application, cloud-based security, ibm, ibm security, security, it management, business intelligence
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.