Internet Security White Papers

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 1 - 25 of 585Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Oct 22, 2014

This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: CA Technologies     Published Date: Oct 22, 2014

This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.

Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
By: Lumension     Published Date: Oct 20, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: CenturyLink Technology Solutions     Published Date: Sep 02, 2014

With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your infrastructure into a more efficient virtual environment.

Tags : centurylink, data center, colocation, infrastructure, facility management, blade servers, internet security, server virtualization
    
By: Dyn     Published Date: Oct 16, 2014

Web presence is now a required option for customers accessing a business’s products and services. But more than just an option, web pages have become the face of most companies to the public. Learn how can you take control of the Internet effect on your company’s web presence through Internet monitoring, analysis and planning.

Tags : dyn, internet visibility, web infrastructure, web presense, customer service, online business, internet performance, network performance
    
By: Dell     Published Date: Oct 14, 2014

In this webinar, a panel of experts will examine infrastructure security needs. The discussion will provide a framework for addressing the data protection and privacy gaps and include metrics that can help businesses benchmark the success of their investments. The webinar will also present real-world case studies and cloud data protection best practices.

Tags : dell, dell security, security, data protection, privacy, cloud security, cloud computing, network security
    
By: Websense     Published Date: Oct 06, 2014

This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain

Tags : apts, understanding apts, apt security strategy, stages of advanced threats, anti spam, anti spyware, anti virus, application security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Thawte     Published Date: Oct 06, 2014

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : internet security, ssl, customer satisfaction
    
By: Thawte     Published Date: Oct 06, 2014

Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.

Tags : network security, encryption, internet security, ssl
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: IBM     Published Date: Aug 08, 2014

Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.

Tags : fraud prevention, malware detection, threat intelligence, cybercrime, technology, internet security, intrusion detection, intrusion prevention
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website.

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 29, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 29, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 28, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
By: Websense     Published Date: Jul 08, 2014

This paper provides 5 essentials for protecting against advanced persistent threats (APTS)

Tags : apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End