Security Management White Papers

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 843Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 31, 2015

Security management for mainframe clouds.

Tags : application security, compliance, internet security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: BitSight Technologies     Published Date: Jul 23, 2015

Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.

Tags : vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards
    
By: IBM     Published Date: Jul 15, 2015

How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.

Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction, application security
    
By: IBM     Published Date: Jul 15, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe

Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
    
By: IBM     Published Date: Jul 15, 2015

How to create proactive big data security and privacy strategies

Tags : data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.

Tags : endpoint management, path compliance, lifecycle management, patch management, vulnerability management, endpoint security, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.

Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance
    
By: IBM     Published Date: Jul 15, 2015

Examining the business ramifications of various fraud-prevention technology approaches.

Tags : fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management, malware prevention, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.

Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.

Tags : cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management, disaster recovery
    
By: VMware, Inc.     Published Date: Jul 09, 2015

This paper talks about the benefits and chance that come with cloud computing in a federal agency level.

Tags : cloud computing, cloud solutions, cloud collaboration, opdivs, hhs, health and human services, hybrid cloud platform, cloud models
    
By: CDW     Published Date: Jul 08, 2015

Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.

Tags : dlp, data loss, security, best practices, access control, authentication, identity management, security management
    
By: CDW     Published Date: Jul 08, 2015

Keep data safe, even as it moves outside the perimeter of the traditional network.

Tags : security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management
    
By: CDW     Published Date: Jul 08, 2015

A key to safeguarding data and apps is finding the right partner.

Tags : security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
    
By: CDW     Published Date: Jul 08, 2015

An effective data loss prevention program requires the right technologies and policies in place and working together.

Tags : dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management
    
By: CDW     Published Date: Jul 08, 2015

Addressing vulnerabilities in this growing risk environment.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices
    
By: CDW     Published Date: Jul 08, 2015

Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.

Tags : security, data protection, dlp, data breach, vulnerability management, security management, security policies, data loss prevention
    
By: Mimecast     Published Date: Jun 22, 2015

To find out if your data is being put at risk, get practical advice on how to eliminate this risk, and find out which vendor hits the ‘Bloor Bullseye’.

Tags : file sharing security, file sharing services, best practices, storage services, email security, security management, business intelligence, collaboration
    
By: Mimecast     Published Date: Jun 22, 2015

Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.

Tags : testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals the reason why people love E2E tests.

Tags : end to end testing, testing, test, e2e testing, manual testing, it landscapes, test environment, e2e tests
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
696 Documents
Anti Spam
584 Documents
Anti Spyware
627 Documents
Application Security
884 Documents
Auditing
290 Documents
Authentication
372 Documents
Biometrics
116 Documents
Business Continuity
411 Documents
Change Management
213 Documents
Compliance
666 Documents
Corporate Governance
112 Documents
Database Security
435 Documents
Disaster Recovery
564 Documents
Email Security
589 Documents
Encryption
466 Documents
Firewalls
423 Documents
Hacker Detection
510 Documents
High Availability
319 Documents
HIPAA Compliance
104 Documents
Identity Management
528 Documents
Internet Security
971 Documents
Intrusion Detection
635 Documents
Intrusion Prevention
703 Documents
IPSec
155 Documents
IT Spending
282 Documents
Linux
86 Documents
Microsoft Exchange
134 Documents
Network Architecture
569 Documents
Network Management
802 Documents
Network Security
570 Documents
Network Security Appliance
370 Documents
Network Security Certification
21 Documents
Oracle
101 Documents
Password Management
214 Documents
Patch Management
190 Documents
PCI Compliance
242 Documents
PDA
122 Documents
Phishing
203 Documents
Project Management
259 Documents
RAID
73 Documents
Risk Management
333 Documents
Secure Content Management
190 Documents
Secure Instant Messaging
178 Documents
Server Virtualization
529 Documents
Servers
535 Documents
Small Business Networks
295 Documents
SSL
237 Documents
System Management Software
164 Documents
Unix
35 Documents
VPN
220 Documents
Web Service Security
390 Documents
WiFi
162 Documents
Windows Server
125 Documents
Wireless Security
293 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.