Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 4056Sort Results By: Published Date | Title | Company Name
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Tags : shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.

Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy, cloud, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.

Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
    
By: IBM     Published Date: Jul 22, 2015

Driving transformation in the healthcare industry as it navigates technological, regulatory, legislative and cultural changes.

Tags : it healthcare, cloud computing, cloud security, hybrid cloud, regulatory compliance, it infrastructure, healthcare organizations, data management
    
By: IBM     Published Date: Jul 22, 2015

Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.

Tags : productivity, customer service, automation, automated financial transactions, compliance, customer retention, customer satisfaction, best practices
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro

Tags : security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro

Tags : networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro

Tags : trend micro, targeted attacks, security solutions, technology, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro

Tags : mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro

Tags : security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management
    
By: Citrix Systems     Published Date: Jul 17, 2015

Why app and desktop virtualization should be the foundation for your layered approach.

Tags : information security, layered approach, mobility, application, desktop virtualization, application security, compliance, application integration
    
By: Citrix Systems     Published Date: Jul 17, 2015

Adoption of mobile devices continues to expand.

Tags : windows, applications, platform, security, performance, application security, business intelligence, employee performance
    
By: Citrix Systems     Published Date: Jul 17, 2015

Reduce the work need to provide better security.

Tags : data, data protection, access control, security task, application, desktop virtualization, compliance, business intelligence
    
By: IBM     Published Date: Jul 15, 2015

How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.

Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction, application security
    
By: IBM     Published Date: Jul 15, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe

Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
    
By: IBM     Published Date: Jul 15, 2015

How to create proactive big data security and privacy strategies

Tags : data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.

Tags : endpoint management, path compliance, lifecycle management, patch management, vulnerability management, endpoint security, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.

Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance
    
By: IBM     Published Date: Jul 15, 2015

Examining the business ramifications of various fraud-prevention technology approaches.

Tags : fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management, malware prevention, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.

Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.

Tags : cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management, disaster recovery
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.