Internet Security White Papers

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 1 - 25 of 679Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 31, 2015

Danger of the web.

Tags : application security, hacker detection, internet security, productivity
    
By: IBM     Published Date: Jul 31, 2015

Security management for mainframe clouds.

Tags : application security, compliance, internet security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: BitSight Technologies     Published Date: Jul 23, 2015

Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.

Tags : vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards
    
By: Entrust PKI     Published Date: Jul 21, 2015

Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.

Tags : internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure
    
By: IBM     Published Date: Jul 15, 2015

How to create proactive big data security and privacy strategies

Tags : data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.

Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance
    
By: IBM     Published Date: Jul 15, 2015

Examining the business ramifications of various fraud-prevention technology approaches.

Tags : fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management, malware prevention, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.

Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.

Tags : cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management, disaster recovery
    
By: Mimecast     Published Date: Jun 22, 2015

So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:

Tags : microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks, networking, disaster recovery
    
By: Mimecast     Published Date: Jun 22, 2015

Download this whitepaper today and take a good hard look at one of the biggest threats companies are facing – without preparation your company could be next.

Tags : spear-phising, cyber attacks, cyber threats, network security, company security, application security, business continuity, disaster recovery
    
By: IBM     Published Date: Jun 16, 2015

Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.

Tags : enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: AllClearID     Published Date: Apr 23, 2015

A Study of Actual Payouts for Covered Data Breaches. **This white paper was published by NetDiligence**

Tags : network security, security policies, disaster recovery, compliance, business continuity, internet security
    
By: AllClearID     Published Date: Apr 23, 2015

Use this Incident Response Workbook to begin planning a well-orchestrated response in the event of a data breach. Download the workbook now.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, compliance, disaster recovery
    
By: AllClearID     Published Date: Apr 23, 2015

In this complimentary whitepaper, learn how successful organizations are retaining customers, protecting their reputation, and getting back to business after a data breach. Get the report.

Tags : hacking, network security, anti virus, business continuity, disaster recovery, hacker detection, internet security, vulnerability management
    
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.

Tags : network security management, it security, intrusion prevention, security analysis, cyberattacks, cybercriminals, adaptive protection, intrusion prevention systems
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End