Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3824Sort Results By: Published Date | Title | Company Name
By: Riverbed     Published Date: Apr 24, 2015

Read this white paper to learn 3 critical legacy application evaluation activities to ensure cloud migration success. Activity #1: Determine if there is a cost justification Activity #2: Conduct a cloud readiness study to better understand the business and technical factors Activity #3: Conduct a pre- and post-migration study to understand how the app will behave in the cloud

Tags : legacy application evaluation, cloud migration, cloud readiness, mobile, networking, security, software development, it management
    
By: IBM     Published Date: Apr 23, 2015

This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention.

Tags : ibm, cybercrime, fraud, prevention, technology, financial institutions, security
    
By: Acquia     Published Date: Apr 16, 2015

Can you build an invincible Drupal site? The easy answer is no, but you have a few ways to prepare and secure your site to withstand any sort of vulnerability or traffic spike.

Tags : cloud security, security management, drupal site, protection, security, build an invincible drupal site, security, build secure drupal site
    
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: Citrix Systems     Published Date: Apr 15, 2015

IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
By: IBM     Published Date: Apr 15, 2015

With IBM MobileFirst and IBM’s Smarter Process, you can redesign how you deliver services and support more streamlined business processes. Therefore, you can help enable your customers to have a more superior mobile experience.

Tags : ibm, mobile computing, customer satisfaction, mobile experience, optimization, customer centric, mobile data systems, mobile workers
    
By: Cisco     Published Date: Apr 14, 2015

You face unprecedented challenges to protect your midsize business from cybersecurity threats. New trends such as mobility and cloud are changing how you need to secure devices, data and your network. To deal with these challenges, you need a smart, scalable threat-centric security model. This model needs to provide cost-effective threat remediation and support standard security policies and controls. Cisco can help. We deliver intelligent cybersecurity for the real world. Our threat-centric approach reduces complexity while delivering superior visibility and control—saving you time and reducing costs. With Cisco, you gain advanced threat protection across the entire attack continuum—before, during, and after an attack.

Tags : cisco, cybersecurity, mobility, attacks, protection, cost-effective, secure devices, data
    
By: Seagate Technology     Published Date: Apr 14, 2015

Surveillance is an incredibly dynamic industry that continues to grow at an exponential rate. According to IHS, the industry experienced 12 percent growth last year, and is projected to expand even more this year. Are you keeping up with the trends that are fueling this momentum? More importantly, are you capitalizing on the trends that can give you a profitable competitive advantage? This article will show you what to watch out for and provide some insight you can implement that will help you and your customers do just that.

Tags : video surveillance, ip network cameras, city surveillance, utilities, panoramic network cameras, biometrics, best practices, business activity monitoring
    
By: Seagate Technology     Published Date: Apr 14, 2015

Surveillance systems are evolving from being used primarily for security purposes to being used for analytics and improved ROI. With that in mind, it's important to consider many factors and how they affect the architecture of your surveillance system. This webinar will provide some of the top trends that may affect the outcome of your storage architecture.

Tags : surveillance, seagate, surveillance hdd, surveillance solutions, ip storage, storage management, biometrics
    
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: Seagate Technology     Published Date: Apr 14, 2015

Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.

Tags : surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management
    
By: Adobe     Published Date: Apr 13, 2015

The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.

Tags : adobe, document security, cloud services, it research, global insights, security management, business intelligence, productivity
    
By: IBM     Published Date: Apr 09, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.

Tags : data security, ibm, ibm infosphere, privacy strategy, big data security, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.

Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
    
By: IBM     Published Date: Apr 09, 2015

As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s Zero Trust Model.

Tags : data security, ibm, customer protection, digital workforce, zero trust model, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.

Tags : data security, ibm, risk management, network security, security threat, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.

Tags : data security, ibm, converged network security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.

Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk, data security, networking, it management
    
By: IBM     Published Date: Apr 09, 2015

Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, optimization, security, cyber crime, network security, it security, access control, anti spyware
    
By: IBM     Published Date: Apr 09, 2015

Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

Tags : ibm, nss labs, product testing, network security, computer security, application security, anti spyware, firewalls
    
By: IBM     Published Date: Apr 09, 2015

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.

Tags : ibm, computer security, network security, malware protection, network security, security organization, anti spyware, firewalls
    
By: IBM     Published Date: Apr 09, 2015

This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.

Tags : ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security
    
By: IBM     Published Date: Apr 09, 2015

IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.

Tags : security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
By: IBM     Published Date: Apr 09, 2015

Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

Tags : ibm, integrated security, security weakness, risk management, infrastructure security, application security, firewalls, network security appliance
    
By: IBM     Published Date: Apr 09, 2015

Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.

Tags : ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.