Internet Security White Papers

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 1 - 25 of 627Sort Results By: Published Date | Title | Company Name
By: Arbor Networks     Published Date: Mar 23, 2015

After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.

Tags : arbor networks, arbor, ddos, denial of service, denial of service attacks, network security, network overload, internet security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.

Tags : mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
By: McAfee     Published Date: Feb 25, 2015

This white paper articulates the business benefits derived by companies that have deployed NGFW.

Tags : ngfw, mobile workforce, security, mcafee, new generation firewall, firewall security, firewall, anti spam
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, application security, authentication
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, access control, application security
    
By: CDW-Trend Micro     Published Date: Mar 24, 2015

Survey finds IT leaders ready to consider more effective easier-to-use technology.

Tags : endpoint security, desktop security, mobile security, corporate data, application security, compliance, best practices, anti spam
    
By: CDW-Trend Micro     Published Date: Mar 24, 2015

The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences.

Tags : defense solution, data protection, unexpected risk, unexpected costs, advanced threats, traditional defenses, preventable breaches, application security
    
By: CDW-Trend Micro     Published Date: Mar 24, 2015

Learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers.

Tags : apt, hacker prevention, security solutions, best practices, custom defense, application security, hacker detection, internet security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: Kaspersky     Published Date: Feb 05, 2015

This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.

Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps, application security, encryption, internet security
    
By: Kaspersky     Published Date: Feb 05, 2015

This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.

Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures, anti spyware
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper reveals how important is effective security software for banking threats.

Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks, access control, anti spyware, application security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End