Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 2880Sort Results By: Published Date | Title | Company Name
By: ForeScout     Published Date: Apr 18, 2014

Download your copy of the new eBook entitled “Definitive Guide™ to Next-generation Network Access Control.” This 84-page resource provides security practitioners with key capabilities, implementation considerations, use cases and operational advice for network access control (NAC) and details on how modern NAC platforms can be applied by IT organizations to achieve continuous monitoring and mitigation.

Tags : forescout, next generation network access control, implementation considerations, it organizations, security resources, nac platforms, networking, security
    
By: Norse     Published Date: Apr 18, 2014

Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.

Tags : health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management
    
By: McAfee     Published Date: Apr 16, 2014

Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security
    
By: McAfee     Published Date: Apr 16, 2014

Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.

Tags : siem, big security data, security information, advanced threats, security intelligence, security
    
By: McAfee     Published Date: Apr 16, 2014

SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."

Tags : siem, data storage, event analysis, attacks, forensic analysis, security
    
By: McAfee     Published Date: Apr 16, 2014

This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.

Tags : sans, siem, information and event correlation, critical security controls, reporting, security
    
By: McAfee     Published Date: Apr 16, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, security
    
By: McAfee     Published Date: Apr 16, 2014

This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.

Tags : siem, log management, federal agency, compliance, situational awareness, visualization, security
    
By: McAfee     Published Date: Apr 16, 2014

Why, when and how to re-evaluate your SIEM. Two years after Securosis wrote their first paper on replacing your SIEM, they’re back to update you on SIEM’s continually evolving drivers for threat management, operational efficiency and compliance.

Tags : siem, vendor evaluation, threat management, compliance, tco, operational efficiency, security
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: Citrix     Published Date: Apr 16, 2014

Read how Citrix NetScaler 10, the latest version of one of the industry’s most respected ADCs, is the first such appliance to support active-active clustering.

Tags : adc, citrix, netscaler, clustering, ssl, load balancing, data center, racks
    
By: Citrix     Published Date: Apr 16, 2014

Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.

Tags : data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades
    
By: McAfee     Published Date: Apr 14, 2014

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
By: McAfee     Published Date: Apr 14, 2014

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
By: McAfee     Published Date: Apr 14, 2014

Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw
    
By: McAfee     Published Date: Apr 14, 2014

Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.

Tags : vpn, virtual private network, next generation firewall, mpls, bgp, high availability vpn, multiprotocol layer switching, security
    
By: Damballa     Published Date: Apr 14, 2014

Learn about the industry’s leading solutions for finding advanced threats and see how the right network security system will help your organization identify security threats on the network and respond to individual threats relative to their danger to the network.

Tags : malware, threats, security, network based intelligence, detection, network security, threats
    
By: Damballa     Published Date: Apr 14, 2014

Learn the 6 shortcomings of security sandboxing and see what solutions your organization should be utilizing to detect and protect against advanced threats.

Tags : malware, threats, security, network based intelligence, detection, security sandboxing, virtual execution, network vulnerabilty
    
By: Damballa     Published Date: Apr 14, 2014

Learn about the new ways to detect advanced threats and see how you can integrate big data intelligence to enable breach prevention.

Tags : malware, threats, security, network based intelligence, detection, big data, breach prevention, malware analysis
    
By: Damballa     Published Date: Apr 14, 2014

Learn how to better detect signs of malware on your network and how to protect your organization from threats.

Tags : malware, threats, security, network based intelligence, detection
    
By: Norse     Published Date: Apr 10, 2014

Learn the benefits of leveraging threat intelligence in security monitoring and see the protection it can give you against advance threats and malware.

Tags : norse, threat intelligence, malware, security, threats, malware analysis, protection, big data
    
By: Global Knowledge     Published Date: Apr 08, 2014

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats

Tags : global knowledge, hacking, cehv8, cybersecurity, stuxnet, cyber attacks, security tools, security
    
By: Global Knowledge     Published Date: Apr 08, 2014

AWS has introduced Auto Scaling so that you can take advantage of cloud computing without having to incur the costs of adding more personnel or building your own software. You can use Auto Scaling to scale for high availability, to meet increasing system demand, or to control costs by eliminating unneeded capacity. You can also use Auto Scaling to quickly deploy software for massive systems, using testable, scriptable processes to minimize risk and cost of deployment.

Tags : global knowledge, amazon auto scaling, cloud computing, security, best practices, productivity, project management
    
By: Global Knowledge     Published Date: Apr 08, 2014

The Art of War describes how an understanding of your enemy ensures your success against them in battle. Our battleground is not a field with opposing warriors, but rather, opposing cyber-forces. In this conflict, both the defenders and attackers must use the same tools to gain the same advantages. You can only successfully defend when you understand your opponent, their techniques, and how they use their weapons.

Tags : global knowledge, hacking, cehv8, cybersecurity, stuxnet, cyber attackes, security
    
By: Code 42     Published Date: Apr 08, 2014

Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Adding complexity is the mounting list of government regulations to which enterprises must comply. Read how endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.