Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 2890Sort Results By: Published Date | Title | Company Name
By: Arbor Networks     Published Date: Apr 30, 2014

Whether you’re a hosting provider, cloud infrastructure provider or an enterprise with cloud-based services, you need to be aware of the impact DDoS attacks can have on the availability of your business or its cloud-based services. Join Arbor Networks, the industry leader in DDoS protection, by registering for this free presentation.

Tags : ddos, arbor, arbor networks, cloud computing, cloud, cloud security, hackers, hacker attacks
    
By: SpectorSoft     Published Date: Apr 22, 2014

Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity

Tags : employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
By: Norse     Published Date: Apr 18, 2014

Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.

Tags : health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management
    
By: SpectorSoft     Published Date: Apr 18, 2014

Download the SpectorSoft Implementing Monitoring white paper and you will learn how to assist company executives with determining whether or not to implement employee activity monitoring.

Tags : employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
By: SpectorSoft     Published Date: Apr 18, 2014

Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.

Tags : employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
By: SpectorSoft     Published Date: Apr 18, 2014

Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.

Tags : employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
By: McAfee     Published Date: Apr 16, 2014

Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security
    
By: McAfee     Published Date: Apr 16, 2014

Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.

Tags : siem, big security data, security information, advanced threats, security intelligence, security
    
By: McAfee     Published Date: Apr 16, 2014

SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."

Tags : siem, data storage, event analysis, attacks, forensic analysis, security
    
By: McAfee     Published Date: Apr 16, 2014

This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.

Tags : sans, siem, information and event correlation, critical security controls, reporting, security
    
By: McAfee     Published Date: Apr 16, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, security
    
By: McAfee     Published Date: Apr 16, 2014

This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.

Tags : siem, log management, federal agency, compliance, situational awareness, visualization, security
    
By: McAfee     Published Date: Apr 16, 2014

Why, when and how to re-evaluate your SIEM. Two years after Securosis wrote their first paper on replacing your SIEM, they’re back to update you on SIEM’s continually evolving drivers for threat management, operational efficiency and compliance.

Tags : siem, vendor evaluation, threat management, compliance, tco, operational efficiency, security
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: Citrix     Published Date: Apr 16, 2014

Read how Citrix NetScaler 10, the latest version of one of the industry’s most respected ADCs, is the first such appliance to support active-active clustering.

Tags : adc, citrix, netscaler, clustering, ssl, load balancing, data center, racks
    
By: Citrix     Published Date: Apr 16, 2014

Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.

Tags : data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades
    
By: McAfee     Published Date: Apr 14, 2014

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
By: McAfee     Published Date: Apr 14, 2014

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
By: McAfee     Published Date: Apr 14, 2014

Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw
    
By: McAfee     Published Date: Apr 14, 2014

Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.

Tags : vpn, virtual private network, next generation firewall, mpls, bgp, high availability vpn, multiprotocol layer switching, security
    
By: Damballa     Published Date: Apr 14, 2014

Learn about the industry’s leading solutions for finding advanced threats and see how the right network security system will help your organization identify security threats on the network and respond to individual threats relative to their danger to the network.

Tags : malware, threats, security, network based intelligence, detection, network security, threats
    
By: Damballa     Published Date: Apr 14, 2014

Learn the 6 shortcomings of security sandboxing and see what solutions your organization should be utilizing to detect and protect against advanced threats.

Tags : malware, threats, security, network based intelligence, detection, security sandboxing, virtual execution, network vulnerabilty
    
By: Damballa     Published Date: Apr 14, 2014

Learn about the new ways to detect advanced threats and see how you can integrate big data intelligence to enable breach prevention.

Tags : malware, threats, security, network based intelligence, detection, big data, breach prevention, malware analysis
    
By: Damballa     Published Date: Apr 14, 2014

Learn how to better detect signs of malware on your network and how to protect your organization from threats.

Tags : malware, threats, security, network based intelligence, detection
    
By: Norse     Published Date: Apr 10, 2014

Learn the benefits of leveraging threat intelligence in security monitoring and see the protection it can give you against advance threats and malware.

Tags : norse, threat intelligence, malware, security, threats, malware analysis, protection, big data
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.