Internet Security White Papers

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 1 - 25 of 546Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Apr 02, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

Tags : security, network security, kaspersky, hackers, firewall, disaster recovery, hacker detection, internet security
    
By: Kaspersky     Published Date: Feb 14, 2014

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Tags : cybersecurity, hackers, data protection, secure networks, antivirus, virus, firewall, anti spam
    
By: Kaspersky     Published Date: Feb 14, 2014

Read this white paper to learn just how increasingly complex technology is causing new security challenges, and how best to address them.

Tags : it security, security, cybersecurity, antivirus, virus, antispam, spam, email security
    
By: Kaspersky     Published Date: Feb 14, 2014

Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.

Tags : it security, webinar, free video, security, data protection, business security, business continuity, internet security
    
By: IBM     Published Date: Jan 02, 2014

Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.

Tags : ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Logicalis     Published Date: Mar 07, 2014

Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.

Tags : logicallis, iaas, security, compliance, cloud, cloud security alliance board, infrastructure, application security
    
By: Black Lotus     Published Date: Mar 06, 2014

Download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company. As a provider of distributed denial of service (DDoS) mitigation services, Black Lotus is in a unique position to observe and collect real time data on the threats facing service providers, enterprises, and government agencies.

Tags : ddos, black lotus, black lotus communications, firewall, security, security intelligence, intrusion, network security
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: Lumension     Published Date: Feb 07, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: McAfee     Published Date: Jan 28, 2014

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Tags : epp, endpoint, protection, threats, malware, nss, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 28, 2014

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : av-test, deep defender, rootkits, detection, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Jan 28, 2014

BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.

Tags : endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware, anti virus, encryption, internet security
    
By: SafeNet     Published Date: Jan 14, 2014

Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.

Tags : virtualization, cloud services, security, encryption, safenet, network security, internet security
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: Cisco Systems     Published Date: Dec 23, 2013

In June 2013, Cisco engaged Miercom to evaluate the capabilities and performance of the latest Cisco Integrated Service Router (ISR) for branch offices—the Cisco 4451-X ISR. Review the report in full and discover why Miercom awarded the Cisco 4451-X ISR the Performance Verified award. Read Report

Tags : cisco, cisco waas, miercom, cisco integrated service router, isr, branch offices, bandwidth, wan
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Webroot UK     Published Date: Dec 20, 2013

The Webroot® Intelligence Network (WIN) is a key component of a revolutionary approach to next-generation malware protection. Together, WIN and Webroot is combined with Webroot’s ultra-efficient endpoint agent — Webroot® SecureAnywhere™ Business - Endpoint Protection ensure that both known and... that both known and unknown infections are removed before they do harm.

Tags : webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security, access control
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End