Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 2051 - 2075 of 2281Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Aug 06, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : ibm, banking, security, cyber security, financial, insights
     IBM
By: IBM     Published Date: Aug 06, 2014
Download to learn how security and business continuity can shape the reputation and value of your company.
Tags : ibm, banking, reputation, risk, security, it management
     IBM
By: IBM     Published Date: Aug 06, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : ibm, banking, mobility, risk, mitigation, security
     IBM
By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : security
     IBM
By: Delphix     Published Date: Jun 27, 2014
Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.
Tags : data security, masking products, agile masking, solution, creation, delivery, security, it management, data management
     Delphix
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : cyveillance, mobile security, cyberattacks, threats, malicious attacks, security
     Cyveillance
By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management, enterprise applications, business technology
     Norse
By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to backup processes. A new architectural approach allows IT to project virtual servers and data to the edge, providing for local access and performance. Learn to take advantage of this new approach to recover faster, reduce risk, and save money.
Tags : it services, virtual servers, recovery, reduce risk, storage, performace, security, data center
     Riverbed Technology, Inc.
By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery, risk, security
     Riverbed Technology, Inc.
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, security, it management, data management
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz, security, it management
     Globalscape
By: EVault     Published Date: Mar 21, 2014
Learn the top five advantages of cloud-connected™ disaster recovery.
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
     EVault
By: EVault     Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de: •Déterminer si votre système de sauvegarde et de restauration est limite •Identifier les différentes étapes spécifiques pour mettre en avant les améliorations •Etre moteur en terme d'efficacité, de fiabilité et de rentabilité Inscrivez-vous pour télécharger.
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
     EVault
By: EVault     Published Date: Mar 21, 2014
Learn the top five advantages of cloud-connected™ disaster recovery.
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
     EVault
By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies, survey, malware, networking, security, software development
     Norse
By: FireEye     Published Date: Feb 28, 2014
If I were to boil down these survey results to a single sentence, it would be this: To keep pace with today’s advanced threats, incident response teams need tools and techniques that give them greater speed, accuracy and insight.
Tags : fireeye, incident response, greater speed, greater accuracy, advanced threats, response teams, detect malware, persistent threats, information security, security threats, costly breaches, ineffective defense, cyber-attacks, speed of detection, accuracy of detection, security model, shared risks, security, it management
     FireEye
By: IBM     Published Date: Jan 09, 2014
This management brief discusses the value proposition for the Case for IBM PureFlex System for Cloud-Enabled SAP Enterprise Environments.
Tags : sap, international technology, application serving, system manager, vmware, nodes chassis, netweaver landscape, integrated systems, pureflex system, platform infrastructure, system security, ibm pureflex, security, storage, data management
     IBM
By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking, security
     McAfee
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security
     IBM
Start   Previous    76 77 78 79 80 81 82 83 84 85 86 87 88 89 90    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com