Security Management White Papers

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 756Sort Results By: Published Date | Title | Company Name
By: Kaseya     Published Date: Mar 12, 2015

Fighting Cyber Crime with Automated, Centralized Management

Tags : cyber crime, automation management systems, network security, software applications, network infrastructure, infrastructure, network management, network performance
    
By: Kaseya     Published Date: Mar 12, 2015

Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.

Tags : automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
By: Riverbed     Published Date: Feb 26, 2015

To build modern applications, developers could use some help. That is where application performance management (APM) solutions come in. This whitepaper will provide you 10 ways developers can use APM to improve the quality and performance of their software.

Tags : modern applications, developers, application performance management, apm, software quality, software performance, application security, security management
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.

Tags : mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
By: McAfee     Published Date: Feb 25, 2015

This white paper articulates the business benefits derived by companies that have deployed NGFW.

Tags : ngfw, mobile workforce, security, mcafee, new generation firewall, firewall security, firewall, anti spam
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

Tags : juniper, juniper networks, security, network security, firewalls, intrusion prevention, security management, data protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.

Tags : firewall, network, business assets, security, management, network security, firewalls, security management
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn all about the new dynamically intelligent solutions that are taking security to the next level in this expert Webinar.

Tags : cloud, cybercrime, security intelligence, security, security tool, data center, security management, data protection
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Tintri, Inc.     Published Date: Mar 05, 2015

What is needed is a solution that is application-aware in order to ensure application quality of service. That is the approach Tintri took with its VMstore.

Tags : server virtualization, application storage, storage management, server storage, server environments, storage challenges, infrastructure, storage virtualization
    
By: McAfee     Published Date: Feb 25, 2015

This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: CDW     Published Date: Feb 24, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: Intel Security     Published Date: Feb 23, 2015

This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture
    
By: Intel Security     Published Date: Feb 23, 2015

This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.

Tags : gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.

Tags : security information, security connected framework, big security data, big data, log management, siem, security event management, application security
    
By: Kaspersky     Published Date: Feb 05, 2015

This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.

Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps, application security, encryption, internet security
    
By: Kaspersky     Published Date: Feb 05, 2015

This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.

Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures, anti spyware
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
684 Documents
Anti Spam
574 Documents
Anti Spyware
608 Documents
Application Security
820 Documents
Auditing
288 Documents
Authentication
364 Documents
Biometrics
112 Documents
Business Continuity
385 Documents
Change Management
211 Documents
Compliance
615 Documents
Corporate Governance
112 Documents
Database Security
402 Documents
Disaster Recovery
508 Documents
Email Security
577 Documents
Encryption
458 Documents
Firewalls
397 Documents
Hacker Detection
465 Documents
High Availability
319 Documents
HIPAA Compliance
104 Documents
Identity Management
518 Documents
Internet Security
919 Documents
Intrusion Detection
596 Documents
Intrusion Prevention
661 Documents
IPSec
156 Documents
IT Spending
264 Documents
Linux
88 Documents
Microsoft Exchange
131 Documents
Network Architecture
464 Documents
Network Management
688 Documents
Network Security
538 Documents
Network Security Appliance
362 Documents
Network Security Certification
21 Documents
Oracle
89 Documents
Password Management
213 Documents
Patch Management
188 Documents
PCI Compliance
237 Documents
PDA
122 Documents
Phishing
198 Documents
Project Management
248 Documents
RAID
73 Documents
Risk Management
312 Documents
Secure Content Management
181 Documents
Secure Instant Messaging
177 Documents
Server Virtualization
497 Documents
Servers
501 Documents
Small Business Networks
283 Documents
SSL
229 Documents
System Management Software
159 Documents
Unix
37 Documents
VPN
219 Documents
Web Service Security
378 Documents
WiFi
114 Documents
Windows Server
123 Documents
Wireless Security
268 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.