Security Management White Papers

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 861Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Aug 27, 2015

Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.

Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget, network security, anti virus
    
By: AlienVault     Published Date: Aug 13, 2015

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

Tags : alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection
    
By: AlienVault     Published Date: Aug 13, 2015

Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

Tags : alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection
    
By: Box     Published Date: Aug 11, 2015

This white paper reveals how CIOs are deploying an array of mobile content security technologies, giving them a robust platform upon which to build as their mobile usage expands.

Tags : mobility, mobile security, security technology, mobile for work, mobile, byod, cyod, endpoint
    
By: EMC     Published Date: Aug 04, 2015

Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO

Tags : vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation, it initiatives, storage management, security management
    
By: Adobe     Published Date: Aug 04, 2015

This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Adobe     Published Date: Aug 04, 2015

The rapid adoption of e-signature solutions and the continued strong growth in the market for services and software is driven by several factors:

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.

Tags : network security management, it security, intrusion prevention, security analysis, cyberattacks, cybercriminals, adaptive protection, intrusion prevention systems
    
By: Vectra Networks     Published Date: Aug 03, 2015

Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.

Tags : data, security, threats, protection, advanced threat, ips, ids, firewall
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.

Tags : utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats
    
By: EMC     Published Date: Aug 03, 2015

This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.

Tags : afa, snapshot technology, data protection, recovery strategies, cloud adoption, production data, emc, snapshot performance
    
By: IBM     Published Date: Jul 31, 2015

Security management for mainframe clouds.

Tags : application security, compliance, internet security, security management
    
By: Venafi     Published Date: Jul 27, 2015

Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.

Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
By: Venafi     Published Date: Jul 27, 2015

See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.

Tags : security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
By: Venafi     Published Date: Jul 27, 2015

Read this important brief to learn how to maintain your cybersecurity and reduce risk.

Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
    
By: Venafi     Published Date: Jul 27, 2015

Read the solution brief to close SSH security gaps and protect your business.

Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
By: Venafi     Published Date: Jul 27, 2015

Read this solution brief to learn how Security Operations teams can eliminate outages.

Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: CDW     Published Date: Jul 08, 2015

Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.

Tags : dlp, data loss, security, best practices, access control, authentication, identity management, security management
    
By: CDW     Published Date: Jul 08, 2015

Keep data safe, even as it moves outside the perimeter of the traditional network.

Tags : security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management
    
By: CDW     Published Date: Jul 08, 2015

A key to safeguarding data and apps is finding the right partner.

Tags : security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
    
By: CDW     Published Date: Jul 08, 2015

An effective data loss prevention program requires the right technologies and policies in place and working together.

Tags : dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
699 Documents
Anti Spam
593 Documents
Anti Spyware
637 Documents
Application Security
899 Documents
Auditing
290 Documents
Authentication
381 Documents
Biometrics
116 Documents
Business Continuity
412 Documents
Change Management
213 Documents
Compliance
670 Documents
Corporate Governance
112 Documents
Database Security
441 Documents
Disaster Recovery
566 Documents
Email Security
590 Documents
Encryption
470 Documents
Firewalls
429 Documents
Hacker Detection
517 Documents
High Availability
319 Documents
HIPAA Compliance
104 Documents
Identity Management
532 Documents
Internet Security
979 Documents
Intrusion Detection
643 Documents
Intrusion Prevention
710 Documents
IPSec
155 Documents
IT Spending
284 Documents
Linux
86 Documents
Microsoft Exchange
134 Documents
Network Architecture
576 Documents
Network Management
818 Documents
Network Security
571 Documents
Network Security Appliance
372 Documents
Network Security Certification
21 Documents
Oracle
101 Documents
Password Management
214 Documents
Patch Management
190 Documents
PCI Compliance
244 Documents
PDA
122 Documents
Phishing
203 Documents
Project Management
259 Documents
RAID
73 Documents
Risk Management
334 Documents
Secure Content Management
196 Documents
Secure Instant Messaging
178 Documents
Server Virtualization
528 Documents
Servers
538 Documents
Small Business Networks
296 Documents
SSL
240 Documents
System Management Software
165 Documents
Unix
35 Documents
VPN
220 Documents
Web Service Security
392 Documents
WiFi
163 Documents
Windows Server
125 Documents
Wireless Security
293 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.