Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 2001 - 2025 of 2281Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 07, 2016
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control.
Tags : ibm, threat, trusteer apex, malware, application, networking, security, business technology
     IBM
By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : ibm, credentials, threat, data, analysis, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : ibm, identity, access assurance, identity, security
     IBM
By: IBM     Published Date: Jan 07, 2016
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : ibm, security management, mainframe, cloud, information management, security
     IBM
By: Cisco     Published Date: Dec 24, 2015
New Insights into Approaches to Mobility
Tags : cisco, mobility, survey 2015, business, strategy, security, wireless, enterprise applications
     Cisco
By: VMware AirWatch     Published Date: Dec 10, 2015
Windows 10: L'ultima rivoluzionaria versione rilasciata da Microsoft offre un singolo sistema operativo per dispositivi mobili e PC `tradizionali. Piattaforma unica | Applicazioni unificate | Esperienza intuitiva | Sicurezza integrata Ridefinita per l'era Mobile First, Cloud First.
Tags : windows 10, mobile, cloud first, webinar, security, it management, wireless, data management
     VMware AirWatch
By: ArborNetworks     Published Date: Nov 30, 2015
This white paper will walk you through four steps essential to building a business case for better DDoS protection— one that’s compelling to your business as a whole.
Tags : arbor, ddos, threat, protection, security, business technology
     ArborNetworks
By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015
Tags : intralinks, security, data, threat, business technology
     Intralinks
By: Cisco     Published Date: Nov 17, 2015
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : gartner, cisco, magic quadrant, contact center infrastructure, networking, security, it management, knowledge management
     Cisco
By: VMware AirWatch     Published Date: Nov 13, 2015
Durante la conferencia para desarrolladores WWDC 2014, Craig Federighi, el vicepresidente de Ingeniería de Software de Apple, dijo que iOS ha sido un gran éxito empresarial y resaltó la amplia gama de aplicaciones y funciones administrativas empresariales que Apple ha añadido a los sistemas operativos a través de los años. Federighi también dijo que las funciones de productividad de Mac OS X Yosemite son muy atractivas para los usuarios empresariales. Federighi observó que el 98 por ciento de las empresas de Fortune 500 ya utilizan iOS y Apple continúa implementando nuevas funciones en ambos sistemas operativos para el mercado empresarial. Las actualizaciones más recientes de Apple, iOS 7 y Mac OS X Yosemite, introdujeron funciones nuevas que simplifican el uso y la administración empresarial. Las nuevas funcionalidades de continuidad les permiten a los usuarios navegar libremente a través de los dispositivos Apple, usando un dispositivo tras el otro.
Tags : vmware, emm, mac management, managing macs, airwatch, security, it management, knowledge management
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
¿Gestión de dispositivos móviles (MDM), contenedorización o ambas? Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM). En un acto con analistas celebrado en 2013, un comité de analistas dijo a los asistentes que el fenómeno de uso de dispositivos personales (BYOD) desembocaría en una reducción de los precios, una caída en picado de las ventas y la desaparición de un sector. «En estos momentos, la gestión de dispositivos móviles es un caos y creo que ese mercado va a desaparecer», declaró John Girard ante los asistentes (según CRN.com). Girard predijo una transición hacia la gestión a nivel de aplicación forzada por la tendencia BYOD y la reticencia de los empleados a la gestión de dispositivos personales.
Tags : mdm, containerization, security, enterprise mobility, enterprise applications, business technology
     VMware AirWatch
By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : okta, gartner, magic quadrant, identity and management, idaas, networking, security, it management
     Okta
By: Okta     Published Date: Nov 03, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits.
Tags : okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, networking
     Okta
By: Intel Security     Published Date: Oct 21, 2015
This guide will examine seven common misconceptions and distinguish between myth and reality.
Tags : mcafee, intel, security, malware, cyber, threat, networking, data management
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : mcafee, intel, security, cyber, criminal, networking, data management
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : server security, virtual server security, cloud server security, data center server security, security, data management
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : data loss prevention, dlp, office 365, security, it management, knowledge management
     Intel Security
By: VMware AirWatch     Published Date: Jul 06, 2015
This report details the results of a survey taken from pre-qualified IT decision makers from North America and Europe, and shows how AirWatch by VMware received the highest scores for EMM vendor promise and fulfilment. 950 surveys were completed.
Tags : airwatch, vmware, emm, vendor promise, fulfillment, security, it management, business technology
     VMware AirWatch
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
     Mimecast
By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
     Mimecast
By: QTS Data Centers     Published Date: Jun 09, 2015
In this white paper, 451 Research looks into the cloud to see what’s driving the purchase of cloud security technologies.
Tags : cloud security technologies, cloud security purchases, bring your own device, mobile device management, security, it management, wireless
     QTS Data Centers
Start   Previous    74 75 76 77 78 79 80 81 82 83 84 85 86 87 88    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com