Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 4147Sort Results By: Published Date | Title | Company Name
By: The Institute for Health Technology Transformation     Published Date: Sep 29, 2015

This summit is a unique learning opportunity and offers the ability to connect and be face-to-face with the nation's top HIT thought leaders. The discussions will feature thought leaders and industry experts. *Fee Required*

Tags : ny summit, health conference, latest trends, health events, heath technology, network management, storage management, compliance
    
By: Kaspersky     Published Date: Aug 27, 2015

Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.

Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget, network security, anti virus
    
By: Internap     Published Date: Aug 26, 2015

This white paper will focus on public cloud Infrastructure-as-a-Service (IaaS), including virtual and bare-metal cloud solutions.

Tags : public cloud infrastructure, iaas, bare metal cloud solution, virtual cloud solution, cloud computing, scalability, performance, legacy infrastructure
    
By: Pluralsight     Published Date: Aug 20, 2015

OWASP Top 10 "The Big Picture" is all about understanding the top 10 web security risks we face on the web today in an easily consumable, well-structured fashion that aligns to the number one industry standard on the topic today.

Tags : web security risks, top 10 risks, security, top security risks, it management, internet security
    
By: Entrust     Published Date: Aug 18, 2015

This is a guide about securing your website, online business or mail server.

Tags : best practics, security, vulnerabilities, ssl, tls, login credentials, mail server, online business
    
By: AlienVault     Published Date: Aug 13, 2015

AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM.

Tags : alienvault, security, siem, hacking, threat detection, monitoring, anti virus, application security
    
By: AlienVault     Published Date: Aug 13, 2015

Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

Tags : alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection
    
By: AlienVault     Published Date: Aug 13, 2015

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

Tags : alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection
    
By: Box     Published Date: Aug 11, 2015

This white paper reveals how CIOs are deploying an array of mobile content security technologies, giving them a robust platform upon which to build as their mobile usage expands.

Tags : mobility, mobile security, security technology, mobile for work, mobile, byod, cyod, endpoint
    
By: Viavi Solutions     Published Date: Aug 05, 2015

With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable.

Tags : apm, security, hacking, performance monitoring, anti virus, application security, hacker detection, intrusion detection
    
By: Viavi Solutions     Published Date: Aug 05, 2015

The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.

Tags : apm, security, hacking, performance monitoring, intrusion detection, intrusion prevention, web service security, vulnerability management
    
By: Adobe     Published Date: Aug 04, 2015

This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Adobe     Published Date: Aug 04, 2015

The rapid adoption of e-signature solutions and the continued strong growth in the market for services and software is driven by several factors:

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Adobe     Published Date: Aug 04, 2015

Learn how e-signatures remove the last barrier between a hybrid paper to digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract.

Tags : electronic signatures, digital signatures, paper to digital, business intelligence, database, e-signatures, online signatures, authentication
    
By: Adobe     Published Date: Aug 04, 2015

Learn how technologies like e-signatures and document management are drastically improving HR processes.

Tags : e-signatures, electronic signatures, digital signatures, document management, improving hr with digital signatures, human resources, authentication, identity management
    
By: Adobe     Published Date: Aug 04, 2015

This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.

Tags : e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement, authentication, identity management, content management system
    
By: EMC     Published Date: Aug 04, 2015

Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO

Tags : vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation, it initiatives, storage management, security management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.

Tags : network security management, it security, intrusion prevention, security analysis, cyberattacks, cybercriminals, adaptive protection, intrusion prevention systems
    
By: Vectra Networks     Published Date: Aug 03, 2015

The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.

Tags : post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.

Tags : utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect against advanced attacks.

Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.

Tags : cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity
    
By: Vectra Networks     Published Date: Aug 03, 2015

Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.

Tags : data, security, threats, protection, advanced threat, ips, ids, firewall
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect prominent securities.

Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.