Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3310Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 14, 2014

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, it security, resilience investments, enhanced brand value, security, it management, best practices, business intelligence
    
By: Centrify Corporation     Published Date: Oct 13, 2014

The amount of apps, passwords, and identities that your employees need to manage every day can really stunt productivity. IT doesn’t like it either. After all, they’re just trying to ensure the security of your enterprise but they’re often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employee have work to do, and they’re suffering from password fatigue, they resort to using passwords that circumvent security practices—inviting hackers into your enterprise data. Solutions to solve the problem are often cumbersome making a complicated problem…well, more complicated.

Tags : service solution, it productivity, idaas, security practices, password fatigue, enterprise security, security
    
By: CenturyLink     Published Date: Oct 10, 2014

Doing Big Data and NoSQL in the public cloud sounds great, but at some point, someone has to write a check to make it happen. Is there a strong financial argument for making this move? Can you start small and grow larger easily? This paper answers this question with a detailed Total Cost of Ownership (TCO) analysis for open source data management in the public cloud. Contrasting cloud deployments on the standard vs hyperscale CenturyLink Cloud stack Powered by Intel Cloud Technology, versus the on-premise analogue, the paper models the relative financial merits of each approach. The paper considers the best potential use cases for on-premise versus cloud and walks through an example use case to show the impact to business outcomes (time to results, cost, TCO). Cost factors compared include:

Tags : total cost ownership, big data, public cloud, security, protection, administrative personnel, data management, data center
    
By: ForgeRock     Published Date: Oct 08, 2014

Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.

Tags : identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services, security, enterprise applications
    
By: IBM     Published Date: Oct 07, 2014

A comprehensive study by Solitaire Interglobal Ltd. (SIL) on the business impact of security incursions in today's IT environment. This ground-breaking research, based on 64,200 client data points explores how the vulnerabilities in today's virtualized, internet-connected, cloud-oriented environment can affect your businesses.

Tags : ibm, security, cloud, cloud security, solitaire interglobal, it environment, cloud environment, security incursions
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Thawte     Published Date: Oct 06, 2014

Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.

Tags : network security, encryption, internet security, ssl
    
By: Thawte     Published Date: Oct 06, 2014

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : internet security, ssl, customer satisfaction
    
By: Thawte     Published Date: Oct 06, 2014

A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.

Tags : ssl certificates, application, web server, sensitive information, customer confidence, ssl
    
By: Thawte     Published Date: Oct 06, 2014

In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.

Tags : apache web server, digital certificate, ssl certificate, benefits, ssl
    
By: Thawte     Published Date: Oct 06, 2014

Why Self-Signed Certificates are Much Costlier-and Riskier- Than Working with a Trusted Security Vendor.

Tags : ssl certificates, self-signed, trusted security vendor, hidden costs, ssl
    
By: Thawte     Published Date: Oct 06, 2014

Leveraging Multi-Use Digital Certificates to Simplify Certificate Management and Reduce Costs.

Tags : san, ssl certificates, management, reduce costs, multi-use, ssl
    
By: Workday     Published Date: Oct 06, 2014

Définition du véritable SaaS et des bénéfices pour votre entreprise

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, storage, web service security, mobile data systems
    
By: Workday     Published Date: Oct 06, 2014

Comment reconnaître les applications et fournisseurs de solutions Cloud efficaces

Tags : the cloud, cloud providers, cloud computing, modern saas, mobile computing, mobile data systems, virtualization, mobile device management
    
By: Damballa     Published Date: Oct 03, 2014

Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty

Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
    
By: Damballa     Published Date: Oct 03, 2014

The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence

Tags : damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
By: Damballa     Published Date: Oct 03, 2014

Damballa’s Q2 2014 “State of Infections” report discussed the state of the enterprise under attack and trends in threats seen in the second quarter of 2014. Key findings include: • The rise of ransomware • The relationship between the size of an enterprise and its infection rate.

Tags : damballa, state of infection, enterprise, attacks, reduce risk, infection rate, security
    
By: Damballa     Published Date: Oct 03, 2014

In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised. • Eight detection engines produce fidelity in True Positives • Risk engines priorities response to infections that matter most

Tags : damballa, advanced threats, failsafe, true positives, risk engines, infections, security
    
By: cPacket Networks     Published Date: Oct 02, 2014

The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.

Tags : cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network
    
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
By: Singlehop     Published Date: Oct 01, 2014

As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.

Tags : cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
    
By: OpenText     Published Date: Oct 01, 2014

Interactions with technology and customers have evolved to new heights. Organizations that create a rich and consistent digital presence across many channels will thrive in the global marketplace. The challenge is to extract value from managed content, optimize, and personalize that content delivery, and bridge the chaotic interactive world with the secure data repositories that reside behind the firewall. In today's customer-centric era, brands must deliver compelling and engaging experiences fueled by a contextual understanding of their global customers, all while adhering to established information governance policies and standards.

Tags : opentext, cem, omni-channel, adaptive content, secure data, global marketplace, customer centric, brands
    
By: OpenText     Published Date: Oct 01, 2014

Customer experiences have evolved tremendously over the years. Technology has made buyers smarter and more empowered; with online reviews and mobile web access, customers know more about a company's products, services, competitors, and pricing than the organization may know itself. Today's consumers expect tailored, engaging experiences and rich content delivered seamlessly across a variety of touch points.

Tags : opentext, cem, digital asset management, onmi channel, rich media, online reviews, mobile web access, engagement
    
By: Sourcefire, LLC     Published Date: Sep 30, 2014

Download this infographic today to gain a better understanding of integrated threat defense and the visibility to discover and protect against socially engineered exploits.

Tags : cisco, sourcefire, network security, integrated threat defense, big data analysis, real-time monitoring, security, business analytics
    
By: Sourcefire, LLC     Published Date: Sep 30, 2014

As threats continue to penetrate networks, organizations need to find new ways to defend against them. NSS Labs recently conducted the most rigorous next-generation firewall (NGFW) testing to date. Cisco ASA with FirePOWER Services excelled as compared to other tested products. Download this Data Sheet now to find out how Cisco ASA with FirePOWER Services excels in NSS Labs Testing.

Tags : cisco, sourcefire, network security, firewall security, next-generation firewall, ngfw, nss, nss labs
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.