Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3099Sort Results By: Published Date | Title | Company Name
By: Skillsoft     Published Date: Jul 23, 2014

This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.

Tags : skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware
    
By: CBeyond     Published Date: Jul 22, 2014

This guide was created to offer a preliminary understanding of Cloud computing, so that business owners and managers will be better positioned to make the move toward Cloud services sooner, rather than later.

Tags : cbeyond, cloud computing, cloud applications, cloud security, virtual applications, business software, business applications, small business networks
    
By: LogMeIn     Published Date: Jul 18, 2014

A Nucleus Research guidebook to LogMeIn Rescue

Tags : logmein rescue, rescue guidebook, saas, management tools, remote control, network management, mobile computing, customer relationship management
    
By: Riverbed     Published Date: Jul 18, 2014

Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!

Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration, remote access, mobile computing, mobile workers
    
By: AlienVault     Published Date: Jul 16, 2014

“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Tags : alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
    
By: CA Technologies     Published Date: Jul 16, 2014

A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.

Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: Neustar     Published Date: Jul 14, 2014

More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more

Tags : neustar, ddos, cybercrimes, malware, botnets, stolen cards, smokescreens, underground economy
    
By: Neustar     Published Date: Jul 14, 2014

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Tags : neustar, blackbeard, pirate, siteprotect, cloud computing, ddos, it department, security
    
By: Neustar     Published Date: Jul 14, 2014

It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.

Tags : neustar, ddos, ecommerce, protection, security, malware, technology, it departments
    
By: Neustar     Published Date: Jul 14, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Tags : neustar, ddos, online gaming, ecommerce, protection, security, malware, technology
    
By: AlienVault     Published Date: Jul 14, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

Tags : alienvault, limited resources, it time management, it prioritization, it management, security
    
By: Symantec Corporation     Published Date: Jul 11, 2014

View the SSL 101 video and discover how Symantec SSL Certificates help you protect your business and your customer’s confidential information from attack.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Learn why the world’s largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Symantec extends SSL solutions with comprehensive website security solutions that enables companies to protect and grow their businesses by showing their customers that their trusted website is safe to search, surf and buy.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Increase your website security with Extended Validation SSL certificates and find out how that translates to increased revenue for your business.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Online shopping shouldn’t have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks you’ll be on your way to browsing and buying in safety.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: VSS Monitoring     Published Date: Jul 09, 2014

A full-service personal bank has provided award winning financial services to its customers for over fifty years. As one of the oldest independently owned and managed banks in the region, it takes great pride in offering superior customer service and support. Its networks support daily operations for over 19 local offices and hundreds of thousands of customer accounts. Download to learn more!

Tags : vss monitoring, financial services provider, security, roi, banking, customer service
    
By: VSS Monitoring     Published Date: Jul 09, 2014

In an environment where a millisecond can cost a million dollars, the monitoring infrastructure must capture 100 percent of the traffic, regardless of its characteristics. The world of high-frequency trading (HFT) and algorithmic trading places high demands on the network infrastructure with no tolerance for packet latency or loss. Download to learn more!

Tags : vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading, it management
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.