Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 2276 - 2281 of 2281Sort Results By: Published Date | Title | Company Name
By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy, cloud, networking, security, it management, knowledge management
     XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
     XO Communications
By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
     YouSendIt
By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
     YouSendIt
By: Zerto     Published Date: Nov 02, 2012
When organizations are considering a business continuity/disaster recovery solution, they look for solution that protects and recovers the data and application. Read this white paper to learn more about protecting Tier-1 applications with Zerto.
Tags : zerto, application security, data security, data recovery, application recovery, data solution, security, data management, business technology, data center
     Zerto
By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : zsl, soap, java, wsdl, uddi, web service security, risk exposure, security, software development
     ZSL Inc.
Start   Previous    78 79 80 81 82 83 84 85 86 87 88 89 90 91 92     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com