Security Management White Papers

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 710Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : mobility, management, boyd, secure app, data delivery, security management, smart phones, secure content management
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Allscripts     Published Date: May 01, 2014

Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.

Tags : allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional
    
By: Kaspersky     Published Date: Feb 14, 2014

Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.

Tags : it security, webinar, free video, security, data protection, business security, business continuity, internet security
    
By: Kaspersky     Published Date: Feb 14, 2014

If businesses are to benefit from the potential productivity gains offered by increased mobile access – and employees are able to enjoy the convenience of BYOD – security and IT departments are faced with having to ensure their business is protected against all the new mobile security threats.

Tags : mobile security, secure networks, mobile, smartphone, iphone, mobile data, access control, security management
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Imprivata     Published Date: Dec 06, 2013

Ensure that you have the right single sign-on vendor with this easy to use vendor selection evaluator’s guide.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Symantec Corporation     Published Date: Oct 03, 2013

Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.

Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: Mimecast     Published Date: May 15, 2014

This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control
    
By: Turn     Published Date: May 06, 2014

What’s the best way to keep your brand safe while running cost-effective campaigns? How do you maximize reach and scale while avoiding undesirable contexts?

Tags : dwa, smart market, brand protection, digital advertising, unprecedented reach, deploy campaign, protection strategy, safeguards
    
By: Symantec     Published Date: May 02, 2014

Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Kaspersky     Published Date: Apr 24, 2014

This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.

Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
    
By: Bit9     Published Date: Apr 23, 2014

Download this white paper to learn the 9 strategies to think about when looking to take control of the security of your systems AND more easily maintain PCI compliance.

Tags : bit9, compliance, pci compliance, security, retail system, security solutions, validation, payment card security
    
By: Bit9     Published Date: Apr 23, 2014

This white paper explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : bit9, security, compliance, security solutions, visibility, detection, threat protection, cyber security
    
By: Bit9     Published Date: Apr 23, 2014

Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance.

Tags : bit9, security, compliance, data breach, cyber attack, threat protection, pci compliance, payment card industry
    
By: Dyn     Published Date: Apr 02, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: SilverSky     Published Date: Mar 26, 2014

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.

Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
857 Documents
Anti Spam
554 Documents
Anti Spyware
602 Documents
Application Security
918 Documents
Auditing
320 Documents
Authentication
378 Documents
Biometrics
116 Documents
Business Continuity
394 Documents
Change Management
200 Documents
Compliance
752 Documents
Corporate Governance
110 Documents
Database Security
340 Documents
Disaster Recovery
510 Documents
Email Security
644 Documents
Encryption
487 Documents
Firewalls
406 Documents
Hacker Detection
534 Documents
High Availability
333 Documents
HIPAA Compliance
113 Documents
Identity Management
643 Documents
Internet Security
981 Documents
Intrusion Detection
664 Documents
Intrusion Prevention
726 Documents
IPSec
171 Documents
IT Spending
257 Documents
Linux
90 Documents
Microsoft Exchange
125 Documents
Network Architecture
420 Documents
Network Management
645 Documents
Network Security
503 Documents
Network Security Appliance
409 Documents
Network Security Certification
21 Documents
Oracle
85 Documents
Password Management
244 Documents
Patch Management
198 Documents
PCI Compliance
308 Documents
PDA
116 Documents
Phishing
201 Documents
Project Management
245 Documents
RAID
69 Documents
Risk Management
292 Documents
Secure Content Management
163 Documents
Secure Instant Messaging
195 Documents
Server Virtualization
442 Documents
Servers
472 Documents
Small Business Networks
271 Documents
SSL
222 Documents
System Management Software
153 Documents
Unix
40 Documents
VPN
216 Documents
Web Service Security
367 Documents
WiFi
93 Documents
Windows Server
117 Documents
Wireless Security
241 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.