Internet Security White Papers

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 1 - 25 of 644Sort Results By: Published Date | Title | Company Name
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: IBM     Published Date: Apr 09, 2015

Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, optimization, security, cyber crime, network security, it security, access control, anti spyware
    
By: IBM     Published Date: Apr 09, 2015

Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

Tags : malware protection, ibm, network security, it security, application security, internet security, intrusion detection, intrusion prevention
    
By: IBM     Published Date: Apr 09, 2015

The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.

Tags : ibm, it security, vulnerability management, virus protection, spyware protection, firewalls, hacker detection, internet security
    
By: IBM     Published Date: Apr 09, 2015

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.

Tags : ibm, computer security, network security, malware protection, network security, security organization, anti spyware, firewalls
    
By: IBM     Published Date: Apr 09, 2015

IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.

Tags : security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
By: Kaspersky     Published Date: Feb 05, 2015

This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.

Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps, application security, encryption, internet security
    
By: Kaspersky     Published Date: Feb 05, 2015

This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.

Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures, anti spyware
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper reveals how important is effective security software for banking threats.

Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks, access control, anti spyware, application security
    
By: McAfee     Published Date: Jan 20, 2015

Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security.

Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, anti spyware, anti virus, firewalls, internet security
    
By: McAfee     Published Date: Jan 20, 2015

CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.

Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, networking, firewalls, internet security
    
By: McAfee     Published Date: Jan 20, 2015

The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.

Tags : situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, networking
    
By: McAfee     Published Date: Jan 20, 2015

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, networking, firewalls, internet security
    
By: McAfee     Published Date: Jan 20, 2015

The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.

Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
By: AllClearID     Published Date: Apr 23, 2015

Report | Recommendations for Enterprise Security in 2015

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, business continuity, compliance
    
By: AllClearID     Published Date: Apr 23, 2015

Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, anti virus, business continuity
    
By: AllClearID     Published Date: Apr 23, 2015

Use this Incident Response Workbook to begin planning a well-orchestrated response in the event of a data breach. Download the workbook now.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, compliance, disaster recovery
    
By: AllClearID     Published Date: Apr 23, 2015

In this complimentary whitepaper, learn how successful organizations are retaining customers, protecting their reputation, and getting back to business after a data breach. Get the report.

Tags : hacking, network security, anti virus, business continuity, disaster recovery, hacker detection, internet security, vulnerability management
    
By: Bit9     Published Date: Apr 16, 2015

You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise.

Tags : data breach, breach preparation, cyber attack, data security, threat detection, security, application security, hacker detection
    
By: Bit9     Published Date: Apr 16, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced threat hunting, traditional detection, endpoint data collection, threat intelligence, threat detection, access control, firewalls, hacker detection
    
By: Arbor Networks     Published Date: Mar 23, 2015

After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.

Tags : arbor networks, arbor, ddos, denial of service, denial of service attacks, network security, network overload, internet security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.

Tags : mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End