Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3231Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Aug 27, 2014

Join us for this Gigaom Research Webinar on Wednesday, August 27, 2014, at 10 a.m. PT; we will examine the immediate need to extend identity to customer audiences, the risks of doing so using legacy software, and the most effective path businesses can take to build for the future while recognizing value today.

Tags : forgerock, api, customer service, crm, business intelligence, business data, access management, identity management
    
By: McAfee     Published Date: Aug 14, 2014

Read this report to get a solid overview of Advanced Evasion Techniques (AET) and how they behave, along with some brilliant Industry Insights.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
By: McAfee     Published Date: Aug 14, 2014

Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.

Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
    
By: McAfee     Published Date: Aug 14, 2014

Are you using the latest tools to guarantee your network survives an attack? Have you automated routine tasks, simplified upgrades and implemented plug-and-play deployment capability? Here are eight best practices for managing your network security.

Tags : firewall management, ngfw, next generation firewall, firewall resource, firewall staff, resource optimization, network security management, ngfw
    
By: McAfee     Published Date: Aug 14, 2014

The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.

Tags : situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, security
    
By: McAfee     Published Date: Aug 14, 2014

Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Aug 14, 2014

URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.

Tags : url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features
    
By: McAfee     Published Date: Aug 14, 2014

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.

Tags : esg, esg lab, firewall evaluation, firewall lab report, firewall test, next generation firewall, mcafee ngfw, security
    
By: McAfee     Published Date: Aug 14, 2014

The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.

Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
By: VSS Monitoring     Published Date: Aug 11, 2014

Read this case study and learn how a full-service bank secured thousands of customer accounts with VSS Using VSS Protector Series, the financial institution: • Optimizes monitoring at all choke points throughout its 19 regional offices • Protects its network from external cyber threats & internal data leakage • Enables 100% network visibility & coverage for security & monitoring tools • Meets new high regulatory standards • Enhances legacy security devices while maximizing tool utilization & ROI • Increases reliability, with uptime meeting the five nines & achieves low latency • Reduces capital & operational expenditure • Directs traffic to multiple security tools, without creating daisy chain • Lays a foundation for plug-and-play expansion

Tags : vss monitoring, financial services provider, security, roi, banking, customer service
    
By: Qualys     Published Date: Aug 08, 2014

Get all the Facts and See How to Implement a Successful Vulnerability Management Program

Tags : management implementation, network security, solutions, key resources, security
    
By: Qualys     Published Date: Aug 08, 2014

An Introduction to Defending Your Business Against Today’s Most Common Cyber Attacks

Tags : cyber attacks, defense, web application, business data, application security, anti spyware, anti virus, internet security
    
By: IBM     Published Date: Aug 08, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
By: IBM     Published Date: Aug 06, 2014

Download here to learn how security and business continuity can shape the reputation and value of your company.

Tags : ibm, insurance, reputational risk, security
    
By: IBM     Published Date: Aug 06, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : ibm, banking, business, fraud-prevention, fraud, technology, security
    
By: IBM     Published Date: Aug 06, 2014

Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.

Tags : ibm, banking, cybercrime, prevention, solution, fraud, security
    
By: EMC Corporation     Published Date: Aug 05, 2014

Security operations centers need advanced analytical tools that can quickly collect and shift through security data. This brief looks at the latest options and processes to speed up detection of advanced threats.

Tags : security, analytics, threats, security operations centers, security data, advanced threats, speeding up threat detection
    
By: EMC Corporation     Published Date: Aug 05, 2014

It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
By: EMC Corporation     Published Date: Aug 05, 2014

Roland Cloutier, CISO of ADP, describes how the largest single payer in the US tax system leverages RSA Security Analytics as the foundation of their Trusted Platform Security Initiative.

Tags : case study, adp, best practices, security analytics, rsa, trusted platform security initiative, security, security management
    
By: EMC Corporation     Published Date: Aug 05, 2014

Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
By: EMC Corporation     Published Date: Aug 05, 2014

To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
By: VSS Monitoring     Published Date: Aug 05, 2014

Learn how VSS Monitoring was able to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks and see how your organization can do the same thing.

Tags : security software, security integrity, high speed networks, upgrades, deployments, networking technologies, security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.