Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3453Sort Results By: Published Date | Title | Company Name
By: Netapp     Published Date: Dec 12, 2014

This white paper provides information on how Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance. NetApp’s systems, software, and services offer a number of advantages as a foundation for better operational results.

Tags : advantages of netapp's systems, database environment, enterprise database trends, database proliferation, database improvements, olap, storage management, security management
    
By: F5 Networks     Published Date: Dec 10, 2014

Virtualization caused a major cultural shift in IT. By enabling physical assets to be better utilized, IT teams realized that they could deliver systems to their customers in a more timely manner, thereby delivering better value. In this webinar you will learn what is NetOps and how is it different from DevOps.

Tags : f5 networks, devops, agile, netops, data center, virtualization, sdn, infrastructure
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Business protection should never be taken lightly, but it can be tough to know where to begin. This checklist is a way to get you started, helping you safeguard your company.

Tags : business protection, intrusion, vandalism, theft, security
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

In order to protect your business against a potential burglary, it pays to get in the mind of a burglar. So we did just that.

Tags : intrusion, vandalism, theft, burglary, security, best practices, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Lock and key is the most traditional access control measure, but it’s not without its security gaps. There are other access control measures that can help you streamline your business in ways you may never have considered.

Tags : access control, business protection, security, business intelligence, business management
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

From burglars to your own employees, theft can rock your bottom line. Learn what you can do to protect your business.

Tags : intrusion, theft, burglary, security, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Today’s systems are better at detecting fires than ever before, yet they’re more complex and require maintenance in order to be effective. One missed inspection or instance of deferred maintenance can result in a system that doesn’t work when you need it most. Learn how you can fireproof your business and protect your company and employees.

Tags : business protection, fire safety, security, best practices
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Do you know how safe your business is? Discover the crime trends and statistics from across the United States that all business owners should know.

Tags : intrusion, vandalism, theft, burglary, security, business intelligence, business metrics
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Examine this map and discover the dangers from external and internal threats that might apply to you. From both internal and external threats, see what hazards exist so you can protect your livelihood.

Tags : business protection, security, burglary, vandalism, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Safeguarding your business doesn’t have to be a long, time-consuming endeavor. Through mobile security management, you can improve visibility with real-time alerts and video clips.

Tags : remote security, business protection, security, business intelligence, business management
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Today’s security camera systems are extremely reliable, yet a mere out-of-focus lens can still completely destroy all hope of catching your culprit and saving your resources. See what routine camera maintenance requires, and learn how you can be sure your inspections are thorough.

Tags : security cameras, theft, security, business intelligence, business management
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Make the most out of your security technology. Learn six ways you can achieve higher profits by taking full advantage of your security system and the information it gathers.

Tags : cost savings, business intelligence, security, productivity
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.

Tags : video surveillance, access control, business intelligence, security, best practices
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Running a business is hard. So don’t make it even harder on yourself by piling on security tasks without involving an outside expert.

Tags : business protection, intrusion, fire safety, security, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Start protecting your company with a small piece of technology that 85% of business owners tow around as their life force: your smartphone. Discover how making your business more secure can be as simple as it is vital.

Tags : remote security, business protection, security, mobile data systems, mobile workers
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

In order to get you started, we’ve consulted the experts. Learn how you can begin moving your company in a secure direction with these three basic steps.

Tags : business protection, security, theft, crime, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

When theft or violence is mixed with your bottom line, the damage can go way beyond physical and monetary consequences. We’ve outlined some ways you can begin eliminating both internal and external threats.

Tags : business protection, workplace violence, burglary, employee theft, business management, security, best practices, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Establishing a thriving business takes dedication and hard work, yet that can easily be destroyed without taking precautionary measures. To create more safety awareness, we’ve listed the top five vulnerabilities business owners face every day.

Tags : robbery, burglary, theft, liability, fire safety, vandalism, security, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

The cloud is no longer just for deploying software – it’s now transforming the way companies physically secure their business. Learn how you can future-proof your business and secure your company with the flexibility of the cloud and the latest security know-how.

Tags : video security, cloud, business protection, security, business intelligence, cloud computing
    
By: Symantec     Published Date: Dec 04, 2014

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.

Tags : phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
    
By: Symantec     Published Date: Dec 04, 2014

This white paper explains why PKI is the key to the future of trust on the Internet; what steps must be taken to build a stronger, more trustworthy PKI ecosystem.

Tags : pki, pki ecosystem, browser developers, internet security, security, symantec
    
By: Symantec     Published Date: Dec 04, 2014

SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks.

Tags : ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
By: Symantec     Published Date: Dec 04, 2014

The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.

Tags : ssl, http, firesheep, side-jacking, wi-fi attacks, tls, user protection, security
    
By: Symantec     Published Date: Dec 04, 2014

Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks.

Tags : web servers, code-signing, malware, software, code-signing certificates, best practice, security
    
By: Symantec     Published Date: Dec 04, 2014

SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation.

Tags : ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.