Security Management White Papers

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 698Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Apr 02, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: SilverSky     Published Date: Mar 26, 2014

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.

Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.

Tags : silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange
    
By: SilverSky     Published Date: Mar 26, 2014

This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.

Tags : silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration
    
By: Kaspersky     Published Date: Feb 14, 2014

Inside you'll find survey analysis, discover trends, and learn more about what you need to know when it comes to security management.

Tags : kaspersky, security, security management, byod, network security, application security, security policies
    
By: Kaspersky     Published Date: Feb 14, 2014

Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.

Tags : it security, webinar, free video, security, data protection, business security, business continuity, internet security
    
By: Kaspersky     Published Date: Feb 14, 2014

While the business benefits of virtualization are clear—increased performance and stability and decreased hardware costs, floor space, and management oversight—the virtualized world makes your organization vulnerable to a wide array of new cyber security threats. Are you willing to bet your organization’s IT infrastructure on your ability to combat these hazards?

Tags : virtualization, cloud computing, cloud security, data protection, network security, security management, vulnerability management
    
By: Kaspersky     Published Date: Feb 14, 2014

If businesses are to benefit from the potential productivity gains offered by increased mobile access – and employees are able to enjoy the convenience of BYOD – security and IT departments are faced with having to ensure their business is protected against all the new mobile security threats.

Tags : mobile security, secure networks, mobile, smartphone, iphone, mobile data, access control, security management
    
By: hightail     Published Date: Jan 17, 2014

Learn 6 tips and tricks that can help you better organize and utilize your email in order to increase productivity and improve your workflow.

Tags : knowledge management, enterprise applications, security management, email archiving, cloud computing, content management
    
By: hightail     Published Date: Jan 17, 2014

Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.

Tags : data management, security management, mobile computing, mobile data systems, application integration, application performance management, best practices, business analytics
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.

Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.

Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Symantec Corporation     Published Date: Oct 03, 2013

Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.

Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
    
By: Logicalis     Published Date: Mar 07, 2014

Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.

Tags : logicallis, iaas, security, compliance, cloud, cloud security alliance board, infrastructure, application security
    
By: NAVEX Global     Published Date: Mar 04, 2014

Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.

Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
By: NAVEX Global     Published Date: Mar 04, 2014

Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.

Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: Nativeflow     Published Date: Feb 25, 2014

Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.

Tags : office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management
    
By: Nativeflow     Published Date: Feb 25, 2014

Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.

Tags : enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
By: Symantec Corporation     Published Date: Feb 25, 2014

Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.

Tags : symantec, mobile, mobile applications, security, pki, security management, mobile device management
    
By: Symantec Corporation     Published Date: Feb 25, 2014

The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.

Tags : mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware, security management
    
By: Symantec Corporation     Published Date: Feb 25, 2014

The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.

Tags : symantec, mobile, mobile applications, security, code signing certificates, security management, security policies, vulnerability management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
998 Documents
Anti Spam
529 Documents
Anti Spyware
584 Documents
Application Security
1033 Documents
Auditing
313 Documents
Authentication
371 Documents
Biometrics
109 Documents
Business Continuity
381 Documents
Change Management
203 Documents
Compliance
755 Documents
Corporate Governance
113 Documents
Database Security
336 Documents
Disaster Recovery
505 Documents
Email Security
651 Documents
Encryption
487 Documents
Firewalls
402 Documents
Hacker Detection
542 Documents
High Availability
344 Documents
HIPAA Compliance
115 Documents
Identity Management
752 Documents
Internet Security
1020 Documents
Intrusion Detection
712 Documents
Intrusion Prevention
754 Documents
IPSec
166 Documents
IT Spending
244 Documents
Linux
90 Documents
Microsoft Exchange
119 Documents
Network Architecture
433 Documents
Network Management
664 Documents
Network Security
498 Documents
Network Security Appliance
413 Documents
Network Security Certification
21 Documents
Oracle
65 Documents
Password Management
245 Documents
Patch Management
197 Documents
PCI Compliance
301 Documents
PDA
116 Documents
Phishing
190 Documents
Project Management
251 Documents
RAID
67 Documents
Risk Management
290 Documents
Secure Content Management
152 Documents
Secure Instant Messaging
195 Documents
Server Virtualization
423 Documents
Servers
453 Documents
Small Business Networks
260 Documents
SSL
206 Documents
System Management Software
154 Documents
Unix
38 Documents
VPN
215 Documents
Web Service Security
336 Documents
WiFi
94 Documents
Windows Server
113 Documents
Wireless Security
227 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.