Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3686Sort Results By: Published Date | Title | Company Name
By: destinationCRM.com     Published Date: Apr 15, 2015

It's no secret that the use smart phones is exploding. According to a recent report from the Pew Research Center, 34% Americans go online mostly using their phones, and not using some other device such as a desktop or laptop computer. The implication for location based marketing and ecommerce, customer service, and personalized, permission based marketing is enormous, but the rules of engagement are markedly different for mobile communications.

Tags : mobile data, customer engagement, crm, customer data, smartphones, mobile communications, mobile data systems, smart phones
    
By: Network Instruments     Published Date: Apr 01, 2015

With the expanding sophistication of large-scale breaches, the question isn’t whether most organizations will be hacked – it’s when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.

Tags : apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection, intrusion prevention
    
By: Comcast     Published Date: Mar 24, 2015

The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.

Tags : healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, security
    
By: Waratek     Published Date: Mar 23, 2015

Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.

Tags : application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching
    
By: IBM     Published Date: Mar 18, 2015

Download this leading-edge research today to learn about the critical business and performance metrics that can be used to assist an organization in choosing the optimal security platform.

Tags : security, platform security, cyber criminal, security software, security appliances, cloud architecture, electronic exposure, business models
    
By: NAVEX Global     Published Date: Mar 18, 2015

Get the inside track on the key ethics and compliance industry trends that will impact your business in 2015—and get the resources you need to help you plan for the year ahead.

Tags : ethics and compliance, ethics trends, compliance
    
By: NAVEX Global     Published Date: Mar 18, 2015

In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.

Tags : compliance, software compliance
    
By: Polycom     Published Date: Mar 13, 2015

As the financial services industry moves away from its historic focus—on high margin business, banking, brokerage, insurance, trading, wealth management, and payment companies—they must rethink and strengthen the ways they interact with markets and customers. Organizations that fail to provide personalized services for their clients or to satisfy increasingly demanding customers will struggle to keep their position as competitors innovate at every turn.

Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
By: Polycom     Published Date: Mar 13, 2015

The Dominion Group of Companies offers clients a wide range of professional services, including investment advising, trust services, wealth management, and insurance. Based in Virginia Beach, Virginia, the company has three main offices as well as independent affiliate offices in multiple locations throughout the United States. Dominion is a small but growing company, currently employing 40 people. A recent opportunity for expansion of the trust side of the business required Dominion to branch out from its Virginia Beach headquarters, opening an office in Florida and relocating one of the firm’s principals to that location. A top priority during that transition was maintaining effective communication, despite the distance, to limit any disruption to existing client services and workflows.

Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
By: Polycom     Published Date: Mar 13, 2015

United Bank for Africa (UBA) Group is one of Africa’s leading financial institutions offering banking services to more than seven million customers via 750 branches in 18 African countries. With further offices in New York, London and Paris, UBA is connecting people and businesses across the world through retail and corporate banking, innovative cross-border payments, trade finance and investment banking. Over the past three years, UBA had undergone a period of rapid expansion that had seen affiliate banks in 16 African countries come on board. This expansion has naturally put the group’s communication infrastructure under pressure.

Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
By: Polycom     Published Date: Mar 13, 2015

Korean securities and investment firm boosts profits through secure and reliable financial transmissions. Secure financial video data transmission of up to 25,000 concurrent sessions, help boost Woori client confidence and profits for Korean investment and securities firm.

Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
By: Kaseya     Published Date: Mar 12, 2015

Fighting Cyber Crime with Automated, Centralized Management

Tags : cyber crime, automation management systems, network security, software applications, network infrastructure, infrastructure, network management, network performance
    
By: Kaseya     Published Date: Mar 12, 2015

As an IT professional, you know that when you have many users to support, every second counts! Slow remote desktop connection times and poor, unreliable connection performance can add up to significant time wasted when extended over days, weeks and months of remote control sessions.

Tags : desktop management, virtual system administrator, storage virtualization, application security, application integration, application performance management, business integration, software compliance
    
By: Kaseya     Published Date: Mar 12, 2015

Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.

Tags : automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
By: Kaseya     Published Date: Mar 12, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : backup, disaster recovery, it challenges, it solutions, automated data management, virtualization, big data, backup and recovery
    
By: IBM     Published Date: Mar 11, 2015

Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!

Tags : ibm, cybercrime prevention, it security solutions, trusteer, security, it management, knowledge management, data management
    
By: IBM     Published Date: Mar 11, 2015

The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.

Tags : ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications, employee performance
    
By: IBM     Published Date: Mar 11, 2015

Read the IBM white paper, “Protecting corporate credentials against today’s threats”, to learn why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.

Tags : ibm, corporate credentials, credentials theft, identity management policies, anti-malware software, security, enterprise applications, data management
    
By: Riverbed     Published Date: Feb 26, 2015

In order to be successful today, operations teams require complete application-level visibility across the entire environment.

Tags : customer relationship management, security, human resources, sales force automation, application integration, data protection, network performance, network management
    
By: Riverbed     Published Date: Feb 26, 2015

Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.

Tags : pci compliance, auditing, data security, cardholder data, security standards, security measures, security, data management
    
By: Riverbed     Published Date: Feb 26, 2015

To build modern applications, developers could use some help. That is where application performance management (APM) solutions come in. This whitepaper will provide you 10 ways developers can use APM to improve the quality and performance of their software.

Tags : modern applications, developers, application performance management, apm, software quality, software performance, application security, security management
    
By: Riverbed     Published Date: Feb 26, 2015

While powerful and beneficial, the Citrix XenApp environment can present new challenges to IT departments when troubleshooting application performance issues. Citrix acts as a proxy for backend applications, making it difficult to get end-toend visibility of transactions and to identify and troubleshoot end-user experience problems

Tags : troubleshooting, application performance issues, application management, enterprise application, application virtualization technology, application security, application integration, application performance management
    
By: Riverbed     Published Date: Feb 26, 2015

The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.

Tags : network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device, network management, network performance
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This white paper articulates the business benefits derived by companies that have deployed NGFW.

Tags : ngfw, mobile workforce, security, mcafee, new generation firewall, firewall security, firewall, anti spam
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.