Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3132Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 30, 2014

Join us on July 30th at 10am PT, the panelists will examine the current state of enterprise mobility programs and outline concrete steps and examples that businesses can take to reboot their own mobility efforts.

Tags : ca technologies, emm, enterprise mobility management, mobile workers, mobile devices, byod, enteprise mobility, remote access
    
By: Kaspersky     Published Date: Jul 29, 2014

In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage.

Tags : protect, advanced threats, cyberattacks, sensitive information, financial profit, defensive measures, secure infrastructure, risk
    
By: Global Knowledge     Published Date: Jul 29, 2014

This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

Tags : global knowledge, ibm, tivoli, monitor, infrastructure, capacity, security, software development
    
By: Global Knowledge     Published Date: Jul 29, 2014

There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.

Tags : global knowledge, vcenter, server, esxi, host, vsphere, upgrade, security
    
By: Global Knowledge     Published Date: Jul 29, 2014

Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We will review these concerns and discuss how the industry dealt with them, and then explore how these same concerns can be mitigated with a proper cloud strategy.

Tags : global knowledge, iaas, public clouds, cloud, security, infrastructure, it management
    
By: HP     Published Date: Jul 28, 2014

The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).

Tags : agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing
    
By: Barracuda     Published Date: Jul 25, 2014

This research paper by Info-Tech evaluates 10 competitors in the NGFW market to help you choose the right vendor and products for your enterprise needs.

Tags : ngfw, next generation firewall, evaluation of security providers, security vendor comparison, security
    
By: Citrix     Published Date: Jul 25, 2014

Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.

Tags : email, mobile, collaboration, smartphone, tablets, productivity, access control, mobile workers
    
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Citrix     Published Date: Jul 25, 2014

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : mobility, management, boyd, secure app, data delivery, security management, smart phones, secure content management
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Citrix     Published Date: Jul 25, 2014

After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Tags : mobility management, citrix, mobile app, network security, remote access, mobile workers, smart phones, wireless infrastructure
    
By: Citrix     Published Date: Jul 25, 2014

Managing mobile devices, data and all types of apps—Windows, datacenter, web and native mobile—through a single solution.

Tags : enterprise, mobility, challenge, data, windows, datacenter, web, solution
    
By: Citrix     Published Date: Jul 25, 2014

Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.

Tags : enterprise information, secure, android, apple ios, microsoft window tablets, flexibility, mobile workers, smart phones
    
By: Citrix     Published Date: Jul 25, 2014

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : secure, mobility, management, checklist, mobile computing, wireless infrastructure, wireless security, mobile device management
    
By: Citrix     Published Date: Jul 25, 2014

According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.

Tags : enterprise mobile, executive checklist, security, byod, network security, mobile workers, smart phones, it spending
    
By: Citrix     Published Date: Jul 25, 2014

Discover how to select technologies and develop policies for your BYOD program.

Tags : boyd, simple, secure, technologies, wireless infrastructure, wireless security, best practices, collaboration
    
By: CBeyond     Published Date: Jul 22, 2014

This guide was created to offer a preliminary understanding of Cloud computing, so that business owners and managers will be better positioned to make the move toward Cloud services sooner, rather than later.

Tags : cbeyond, cloud computing, cloud applications, cloud security, virtual applications, business software, business applications, small business networks
    
By: Riverbed     Published Date: Jul 18, 2014

Recent developments and trends such as BYOD, advances in enterprise video technologies, and a proliferation of employee collaboration platforms have prompted more and more organizations to develop comprehensive unified communications (UC) strategies. Compelled by the prospect of reducing communication costs and raising employee productivity, 78% of organizations report they already have a strategic plan and budget in place for at least some components of UC. Download to learn more!

Tags : riverbed, unified communications, communication costs, enterprise video technologies, employee collaboration, remote access, mobile computing, mobile workers
    
By: AlienVault     Published Date: Jul 16, 2014

“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Tags : alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
    
By: CA Technologies     Published Date: Jul 16, 2014

A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.

Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: Neustar     Published Date: Jul 14, 2014

More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more

Tags : neustar, ddos, cybercrimes, malware, botnets, stolen cards, smokescreens, underground economy
    
By: Neustar     Published Date: Jul 14, 2014

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Tags : neustar, blackbeard, pirate, siteprotect, cloud computing, ddos, it department, security
    
By: Neustar     Published Date: Jul 14, 2014

It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.

Tags : neustar, ddos, ecommerce, protection, security, malware, technology, it departments
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.