Internet Security White Papers

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 1 - 25 of 586Sort Results By: Published Date | Title | Company Name
By: Radix FZC     Published Date: Sep 10, 2014

Watch this Live Event on Wednesday September 10th at 2pm EST to learn how you can start using .host, and engage its key benefits to give you a branding and marketing edge.

Tags : radix, radix registry, icann, .host, global hosting, web hosting, doman name, ebusiness
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: IBM     Published Date: Aug 08, 2014

Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.

Tags : fraud prevention, malware detection, threat intelligence, cybercrime, technology, internet security, intrusion detection, intrusion prevention
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods

Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

Tags : security, network security, kaspersky, hackers, firewall, disaster recovery, hacker detection, internet security
    
By: Kaspersky     Published Date: Feb 14, 2014

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Tags : cybersecurity, hackers, data protection, secure networks, antivirus, virus, firewall, anti spam
    
By: Kaspersky     Published Date: Feb 14, 2014

Read this white paper to learn just how increasingly complex technology is causing new security challenges, and how best to address them.

Tags : it security, security, cybersecurity, antivirus, virus, antispam, spam, email security
    
By: Kaspersky     Published Date: Feb 14, 2014

Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.

Tags : it security, webinar, free video, security, data protection, business security, business continuity, internet security
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Qualys     Published Date: Aug 08, 2014

An Introduction to Defending Your Business Against Today’s Most Common Cyber Attacks

Tags : cyber attacks, defense, web application, business data, application security, anti spyware, anti virus, internet security
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website.

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 29, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 29, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 28, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
By: Websense     Published Date: Jul 08, 2014

This paper provides 5 essentials for protecting against advanced persistent threats (APTS)

Tags : apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End