Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3132Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 30, 2014

Join us on July 30th at 10am PT, the panelists will examine the current state of enterprise mobility programs and outline concrete steps and examples that businesses can take to reboot their own mobility efforts.

Tags : ca technologies, emm, enterprise mobility management, mobile workers, mobile devices, byod, enteprise mobility, remote access
    
By: Kaspersky     Published Date: Jul 29, 2014

In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage.

Tags : protect, advanced threats, cyberattacks, sensitive information, financial profit, defensive measures, secure infrastructure, risk
    
By: Global Knowledge     Published Date: Jul 29, 2014

This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

Tags : global knowledge, ibm, tivoli, monitor, infrastructure, capacity, security, software development
    
By: Global Knowledge     Published Date: Jul 29, 2014

There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.

Tags : global knowledge, vcenter, server, esxi, host, vsphere, upgrade, security
    
By: Global Knowledge     Published Date: Jul 29, 2014

Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We will review these concerns and discuss how the industry dealt with them, and then explore how these same concerns can be mitigated with a proper cloud strategy.

Tags : global knowledge, iaas, public clouds, cloud, security, infrastructure, it management
    
By: HP     Published Date: Jul 28, 2014

The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).

Tags : agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing
    
By: Barracuda     Published Date: Jul 25, 2014

This research paper by Info-Tech evaluates 10 competitors in the NGFW market to help you choose the right vendor and products for your enterprise needs.

Tags : ngfw, next generation firewall, evaluation of security providers, security vendor comparison, security
    
By: Citrix     Published Date: Jul 25, 2014

Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.

Tags : email, mobile, collaboration, smartphone, tablets, productivity, access control, mobile workers
    
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Citrix     Published Date: Jul 25, 2014

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : mobility, management, boyd, secure app, data delivery, security management, smart phones, secure content management
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Citrix     Published Date: Jul 25, 2014

After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Tags : mobility management, citrix, mobile app, network security, remote access, mobile workers, smart phones, wireless infrastructure
    
By: Citrix     Published Date: Jul 25, 2014

Managing mobile devices, data and all types of apps—Windows, datacenter, web and native mobile—through a single solution.

Tags : enterprise, mobility, challenge, data, windows, datacenter, web, solution
    
By: Citrix     Published Date: Jul 25, 2014

Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.

Tags : enterprise information, secure, android, apple ios, microsoft window tablets, flexibility, mobile workers, smart phones
    
By: Citrix     Published Date: Jul 25, 2014

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : secure, mobility, management, checklist, mobile computing, wireless infrastructure, wireless security, mobile device management
    
By: Citrix     Published Date: Jul 25, 2014

According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.

Tags : enterprise mobile, executive checklist, security, byod, network security, mobile workers, smart phones, it spending
    
By: Citrix     Published Date: Jul 25, 2014

Discover how to select technologies and develop policies for your BYOD program.

Tags : boyd, simple, secure, technologies, wireless infrastructure, wireless security, best practices, collaboration
    
By: Entrust     Published Date: Jul 21, 2014

The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.

Tags : enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
    
By: Entrust     Published Date: Jul 21, 2014

Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.

Tags : identity guard, cloud services, trust foundation, communication, transactions, information security, cloud-based service, solution
    
By: Entrust     Published Date: Jul 21, 2014

The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.

Tags : identity guard, enterprise, securing identities, corporate network, mobile platforms, security
    
By: Entrust     Published Date: Jul 21, 2014

One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.

Tags : identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile
    
By: Entrust     Published Date: Jul 21, 2014

As various types of digital certificates are introduced to an organization, they become more difficult to track and manage — particularly if they’re issued from different certification authorities.

Tags : identity guard, cloud service, certificate discovery, management solution, security, data management
    
By: Entrust     Published Date: Jul 21, 2014

The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.

Tags : identity guard, cloud services, secure, mobile devices, business efficiency, corporate networks, secure email, security
    
By: Entrust     Published Date: Jul 21, 2014

Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).

Tags : identity guard, cloud services, pki, secure, mobile identities, devices, security
    
By: Entrust     Published Date: Jul 21, 2014

The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.

Tags : device certificates, identity, authentication, mobile world, information technology, security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.