Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3284Sort Results By: Published Date | Title | Company Name
By: Actuate     Published Date: Sep 25, 2014

This webinar on the 5 Best Practices for Designing Data-Driven Apps is hosted by Allen Bonde, VP of Product Marketing & Innovation, Actuate.

Tags : best practices for app design, app design webinar, designing data-driven apps, actuate, enterprise applications, application security
    
By: Lumension     Published Date: Sep 15, 2014

"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "

Tags : secure, ios, android, mobile security, data protection, security
    
By: Bit9     Published Date: Sep 11, 2014

Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Sourcefire, LLC     Published Date: Sep 10, 2014

Maintaining a standard software configuration for all workstations across its organization has been a challenge for this large, multinational manufacturer, who runs each location as an independent unit. Recently, the company decided to launch a new security program to better protect its 16,000 workstations from malware infection. Since the existing endpoint protection software wasn’t offering enough information for security analysts to understand questionable events, as well as to distinguish routine activity from potential threats, the company’s security operations team chose to implement a new anti-malware solution. With the deployment of Sourcefire’s FireAMP, the company’s security analysts now have greater visibility into endpoint activity, and can quickly identify and contain suspicious events before workstations become infected. This has both increased employee productivity and has allowed the team to better protect critical corporate data.

Tags : cisco, sourcefire, network security, spot threats, fireamp, endpoint activity, malware, protection
    
By: HP     Published Date: Sep 08, 2014

Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect

Tags : servers, innovative, management, mobility, security, computational, technologies, mainframes
    
By: AlienVault     Published Date: Sep 05, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Sep 05, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Sep 05, 2014

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

Tags : alienvault, limited resources, it time management, it prioritization, it management, security
    
By: Riverbed     Published Date: Sep 05, 2014

This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.

Tags : cloud, enterprise storage, data protection, it requirements, metrics, security, data management
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.

Tags : sourcefire, network security, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.

Tags : sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity, breaches
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.

Tags : securosis, sourcefire, cisco, endpoint protection, server protection, attack protection, advanced attacks, security
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

In this publication, we hope that you'll learn how to evolve your security strategy to overcome today's security challenges, take advantage of new business models, and gain more effective protections- anytime, all the time.

Tags : gartner, network security, sourcefire, cisco, security report, cyber attack, malware, outdated software
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Making threat protection more intelligent and more accurate

Tags : network security, sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.

Tags : cisco, network security, sourcefire, security report, cyber attack, malware, outdated software, cybersecurity
    
By: CradlePoint     Published Date: Sep 04, 2014

Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.

Tags : security risks, crisis communications, security breaches, compromising customer data, security
    
By: McAfee     Published Date: Sep 04, 2014

Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.

Tags : arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs siem, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.

Tags : siem, sans, endpoint, red, correlación, integración, seguridad, security
    
By: McAfee     Published Date: Sep 04, 2014

El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.

Tags : siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.

Tags : ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas, security, network security
    
By: Alert Logic     Published Date: Sep 03, 2014

As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.

Tags : alert logic, amazon web security solutions, aws business model, security
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: NaviSite     Published Date: Sep 02, 2014

This whitepaper explores the reasons behind changing traditional desktop computing strategies, why cloud-hosted virtual desktops are a compelling solution for many businesses and how to leverage cliud-hosted desktops for windows 7 migrations, mobile and departmental workers, and disaster recovery scenarios.

Tags : virtual desktops, cloud hosted virtual desktops, navisite, remote access, cloud computing, mobile device management
    
By: NaviSite     Published Date: Sep 02, 2014

This white paper will deliver data that provides valuable information based on real compute scenarios to assist buyers of cloud services in understanding how their workloads might perform and what costs are associated with those environments across multiple cloud computing platforms BEFORE they invest in the selection of a cloud computing provider.

Tags : choosing a cloud provider, how to choose a cloud vendor, navisite, wireless, enterprise applications, cloud computing, infrastructure, mobile device management
    
By: Lumension     Published Date: Aug 29, 2014

Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.

Tags : server, security, anti-virus, endpoint security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.