Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3425Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Onapsis     Published Date: Nov 24, 2014

Business-critical platforms such as SAP and Oracle have been in place for more than a decade, however a majority of firms using these applications currently have gaps in their security program. There are many reasons for these security gaps ranging from a reliance on generic security tools, to IT teams lacking complete understanding of how application platforms work. Securing Enterprise Applications, takes a focused look at the major facets in an enterprise application security program, and makes practical suggestions on how to improve efficiency and effectiveness of an organizations security program. This research paper discusses specific security and compliance use cases for large enterprise applications, highlight gaps, and explain some application-specific tools to address these issues. Securing Enterprise Applications spotlights common deficiencies with the core pillars of security controls and products.

Tags : platform security, application platforms, it security tools, enterprise application security, security, it management, knowledge management, enterprise applications
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, firewalls, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, encryption, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, database security, data loss prevention
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage virtualization, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, database security, virtualization, data loss prevention
    
By: Onapsis     Published Date: Nov 19, 2014

Join Analyst & CTO of Securosis, Adrian Lane, and Julie Ford, SAP Security & Cybersecurity Subject Matter Expert for Broadhawk Consulting, for the archived presentation of “State of Enterprise Application Security.” During this presentation they covered current security challenges facing the SAP landscape, the need for business-critical application security, and what can be done to effectively secure SAP systems. This “no fluff” webcast will provided real-world views and discussions around SAP security challenges facing your organization and the best approach on how to build an enterprise application security program.

Tags : onapsis, security, enterprise application security, sap
    
By: IBM     Published Date: Nov 19, 2014

IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.

Tags : ibm, bluemix, cloud-computing, middleware, networking, security, software development, it management
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Nasuni     Published Date: Nov 19, 2014

In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.

Tags : employee habits, corporate it systems, dropbox, it infrastructure, security, it management, knowledge management, enterprise applications
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.