Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3341Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 22, 2014

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

Tags : data classification, data discovery, defining data, data identity, security, it management, data management
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: Zerto     Published Date: Oct 22, 2014

A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto’s easy integration with VMware.

Tags : zerto, vmware, virtualization, data center, virtual replication, replication, business continuity, disaster recovery
    
By: Box     Published Date: Oct 22, 2014

Box helps Marketing teams save time, keep branding consistent and increase efficiency. Learn how Box helps Marketers send large files, work with agencies and create campaigns quickly and productively.

Tags : box, marketing, large files, file transfer, marketing campaigns, productivity, email security, wireless messaging
    
By: Onapsis     Published Date: Oct 21, 2014

NVIDIA is a US-headquartered global technology company best known as a manufacturer of graphics and is now able to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.

Tags : onapsis, security, security technology, sap systems, threat protection, audit scans, monitoring, detection
    
By: Onapsis     Published Date: Oct 21, 2014

Westinghouse Electric Company, Multi-national Nuclear Power Company, was able to put in place a holistic SAP security management process, and to raise their SAP environment security level by automatically and periodically monitoring the platform for new threats.

Tags : onapsis, security, security technology, sap systems, sap environment, sap platform, monitoring, threat protection
    
By: AlienVault     Published Date: Oct 21, 2014

When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.

Tags : mitigate, threats, detect, affordability, solution, deliver, security, visibility
    
By: AlienVault     Published Date: Oct 21, 2014

AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Tags : security, operations, affordability, av labs, open threat, exchange, analyst, report
    
By: AlienVault     Published Date: Oct 21, 2014

The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.

Tags : communication, government, reducing cost, digital, network, public sector, logical, industry
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Aerohive     Published Date: Oct 15, 2014

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, cloud computing, virtualization
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, cloud computing, data center design and management
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, network architecture, network management, network performance, network performance management
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, mobile data systems, mobile workers, cloud computing, virtualization, infrastructure
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.