Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 3359Sort Results By: Published Date | Title | Company Name
By: Aruba Networks     Published Date: Oct 27, 2014

Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.Weak security on your guest network can expose your business to external threats and create serious liability issues.

Tags : network access, user connection, high-performance guest access, security, external threats, liability issues, networking
    
By: IBM     Published Date: Oct 27, 2014

Security is a growing concern in our increasingly connected Internet of Things. Everything that is connected is potentially subject to malicious and criminal attack. Learn how to incorporate security analysis and development techniques to build secure smarter systems.

Tags : security, cyber physical systems, agility, product development, security analysis, secure smarter systems, it management
    
By: IBM     Published Date: Oct 22, 2014

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

Tags : data classification, data discovery, defining data, data identity, security, it management, data management
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: Zerto     Published Date: Oct 22, 2014

A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto’s easy integration with VMware.

Tags : zerto, vmware, virtualization, data center, virtual replication, replication, business continuity, disaster recovery
    
By: Box     Published Date: Oct 22, 2014

Box helps Marketing teams save time, keep branding consistent and increase efficiency. Learn how Box helps Marketers send large files, work with agencies and create campaigns quickly and productively.

Tags : box, marketing, large files, file transfer, marketing campaigns, productivity, email security, wireless messaging
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, web service security, web service management, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers
    
By: CA Technologies     Published Date: Oct 22, 2014

A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.

Tags : improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.

Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, cloud computing, mobile device management
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, customer interaction service
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, it management, mobile computing, mobile data systems
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.

Tags : cloud service management, mobile computing, mobile data systems, cloud computing, mobile device management
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.

Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, cloud computing, mobile device management
    
By: Onapsis     Published Date: Oct 21, 2014

NVIDIA is a US-headquartered global technology company best known as a manufacturer of graphics and is now able to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.

Tags : onapsis, security, security technology, sap systems, threat protection, audit scans, monitoring, detection
    
By: Onapsis     Published Date: Oct 21, 2014

Westinghouse Electric Company, Multi-national Nuclear Power Company, was able to put in place a holistic SAP security management process, and to raise their SAP environment security level by automatically and periodically monitoring the platform for new threats.

Tags : onapsis, security, security technology, sap systems, sap environment, sap platform, monitoring, threat protection
    
By: AlienVault     Published Date: Oct 21, 2014

When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.