Security Management White Papers

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 793Sort Results By: Published Date | Title | Company Name
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Cisco     Published Date: May 14, 2015

The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.

Tags : hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
By: Aerohive     Published Date: May 13, 2015

This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.

Tags : wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod
    
By: Box     Published Date: May 11, 2015

This white paper focuses on four considerations for a mature mobile strategy to reduce the risk of falling behind other key competitors.

Tags : mature mobile strategy, mobile devices, workflow, security, secure collaboration, it strategy, integration, mobility
    
By: Box     Published Date: May 11, 2015

This infographic provides information on how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective.

Tags : mobile, mobility, mobile content management, apply mobile to core processes, share content, access to data, byod, mobile
    
By: Box     Published Date: May 11, 2015

This paper reveals the 6 essential elements of a mobile strategy.

Tags : mobility, modern mobility strategy, mobility strategy, box, mobile, mobile advantage, security, strategy for mobility
    
By: Aerohive Networks     Published Date: May 06, 2015

Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi, security, network security, bandwith limitations, ssid, security management, security policies, secure instant messaging
    
By: Worldpay     Published Date: Apr 29, 2015

In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.

Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data
    
By: Skillsoft     Published Date: Apr 27, 2015

This paper examines five important factors to consider when designing and implementing a Health & Safety Compliance training programme.

Tags : workplace safety programme, training, safety, heatlh, heath and safety, compliance, workplace safety programme, compliance training programme
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: Citrix Systems     Published Date: Apr 15, 2015

IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
By: Seagate Technology     Published Date: Apr 14, 2015

Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.

Tags : surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management
    
By: Adobe     Published Date: Apr 13, 2015

The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.

Tags : adobe, document security, cloud services, it research, global insights, security management, business intelligence, productivity
    
By: IBM     Published Date: Apr 09, 2015

Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

Tags : malware protection, ibm, network security, it security, application security, internet security, intrusion detection, intrusion prevention
    
By: IBM     Published Date: Apr 09, 2015

This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.

Tags : ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security
    
By: IBM     Published Date: Apr 09, 2015

IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.

Tags : security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, application security, security management, business management
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper will help you to understand the importance of creating a DRP for your company. This is a critical step in preparing for disaster, improving employee response, reducing downtime, and quickly returning to normalcy.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, write a drp, steps to write a formal drp, backup and recovery
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper illustrates the difference between the two and what each can do to prepare companies for disaster.

Tags : disaster recovery, risk reduction, causes of disasters, how to avoid disasters, protect your business from disasters, test and measurement, backup and recovery, security management
    
By: Kaspersky     Published Date: Feb 05, 2015

This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.

Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps, application security, encryption, internet security
    
By: Kaspersky     Published Date: Feb 05, 2015

This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.

Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures, anti spyware
    
By: Kaspersky     Published Date: Feb 05, 2015

The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.

Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.

Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam, anti spyware, anti virus, application security
    
By: Adobe     Published Date: Jun 12, 2014

The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.

Tags : adobe, mobile workers, mobile communications, document security, byod, smartphones, cloud documents, access control
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
697 Documents
Anti Spam
578 Documents
Anti Spyware
621 Documents
Application Security
858 Documents
Auditing
288 Documents
Authentication
368 Documents
Biometrics
116 Documents
Business Continuity
393 Documents
Change Management
212 Documents
Compliance
628 Documents
Corporate Governance
112 Documents
Database Security
419 Documents
Disaster Recovery
533 Documents
Email Security
583 Documents
Encryption
461 Documents
Firewalls
413 Documents
Hacker Detection
485 Documents
High Availability
319 Documents
HIPAA Compliance
104 Documents
Identity Management
522 Documents
Internet Security
942 Documents
Intrusion Detection
607 Documents
Intrusion Prevention
674 Documents
IPSec
156 Documents
IT Spending
278 Documents
Linux
86 Documents
Microsoft Exchange
131 Documents
Network Architecture
524 Documents
Network Management
760 Documents
Network Security
563 Documents
Network Security Appliance
365 Documents
Network Security Certification
21 Documents
Oracle
101 Documents
Password Management
213 Documents
Patch Management
188 Documents
PCI Compliance
240 Documents
PDA
122 Documents
Phishing
200 Documents
Project Management
254 Documents
RAID
73 Documents
Risk Management
325 Documents
Secure Content Management
184 Documents
Secure Instant Messaging
179 Documents
Server Virtualization
505 Documents
Servers
514 Documents
Small Business Networks
290 Documents
SSL
230 Documents
System Management Software
162 Documents
Unix
35 Documents
VPN
220 Documents
Web Service Security
386 Documents
WiFi
147 Documents
Windows Server
124 Documents
Wireless Security
281 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.