Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3920Sort Results By: Published Date | Title | Company Name
By: ThreatTrack Security     Published Date: May 21, 2015

This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.

Tags : phishing, next-generation malware, security, email, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.

Tags : cyberthreat, security, malware, defense, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.

Tags : advanced protection, cyberthreat, security, incident response team, threatsecure, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Download this white paper to learn how to add value through malware analysis.

Tags : malware, security threat, cyberattack, cyberthreat, malware analysis, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.

Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar to learn how to win the battle against Advanced Persistent Threats.

Tags : persistent threats, cyberattacks, security, data breach, it management, knowledge management, data management
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.

Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: May 21, 2015

This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.

Tags : threattrack, cyber security, attacks, protection, security
    
By: ThreatTrack Security     Published Date: May 21, 2015

Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks

Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
By: Pluralsight     Published Date: May 18, 2015

Arm your developer team with the information presented in our free course: Web Security and the OWASP Top 10: The Big Picture. In this course, Microsoft MVP and security guru Troy Hunt tells you the necessary steps to take to protect your organization. -Top 10 security risks -Security misconfiguration -Sensitive data exposure -Broken authentication and session management

Tags : web security, security, data, xss, scripting, csrf. pluralsight
    
By: Seagate Technology     Published Date: May 15, 2015

An inside look at how IT Executives and System Integrators are managing video surveillance data.

Tags : system integrators, enterprise it, video surveillance, knowledge management, ip networks, biometrics, intrusion detection, mobile data systems
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Aerohive     Published Date: May 14, 2015

This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.

Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security, gigabit networking, network management, network performance
    
By: Cisco     Published Date: May 14, 2015

The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.

Tags : hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
By: Aerohive     Published Date: May 14, 2015

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, virtualization, cloud computing
    
By: Aerohive     Published Date: May 14, 2015

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Aerohive     Published Date: May 14, 2015

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: May 14, 2015

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, virtualization, cloud computing
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: Kaseya     Published Date: May 13, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, disaster recovery
    
By: Aerohive     Published Date: May 13, 2015

This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.

Tags : wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod
    
By: Aerohive     Published Date: May 13, 2015

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, infrastructure, mobile computing, mobile data systems, mobile workers, virtualization
    
By: Tenable Network Security     Published Date: May 12, 2015

Download and read author Steve Piper's concise, yet detailed new eBook, Definitive Guide to Continuous Network Monitoring, to learn: -Why there is a growing interest in continuous network monitoring -How continuous network monitoring works, and -What’s required to implement continuous network monitoring

Tags : continuous network monitoring, security state, compliance, contextual analytics, vulnerability management, security analytics, networking, security
    
By: IBM     Published Date: May 12, 2015

whitepaper describing how Universal document and image viewers can reduce costs, time and headaches.

Tags : ibm, big data, information lifecycle, email, document sharing, email security, document management, information management
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.