Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2281Sort Results By: Published Date | Title | Company Name
By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn how to properly assess the security needs for your organization and see what areas your team needs to focus its attention on in order to protect your data.
Tags : data breaches, protection, free assessment tool, prevent data breaches, avoid costs, security, data management
     HP Enterprise Services
By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : veracode, security, devops, appsec, enterprise applications, business technology
     Veracode
By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
     uberVU via HootSuite
By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : ibm, security, maturity, mobile, wireless, business technology
     IBM
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
     ForeScout
By: Quest     Published Date: Jul 07, 2012
When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.
Tags : applications, data, delivers, protection, disaster, security, recovery, backup, restoration, control, save, remote, central server, virtual, virtual data backup, backup
     Quest
By: Thawte     Published Date: Aug 09, 2013
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don’t take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, here are 10 best practices that everyone should follow when using this collaboration tool.
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security, enterprise applications, data management, business technology
     Thawte
By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features, security, enterprise applications
     McAfee
By: McAfee     Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security
     McAfee
By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud, networking, security
     Cyveillance
By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : security, tripwire, security management, security based management, data management, business technology, data center
     Tripwire
By: Clearswift     Published Date: Jun 09, 2008
This short guide summarizes ten steps to web security. Do them all, and you'll be better protected than 98% of enterprises out there. But the target never stands still. More than the steps listed here, it's important to focus on the principles behind the steps, including: policy, vigilance, simplification, automation and transparency.
Tags : clearswift, web security, internet security, security
     Clearswift
By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions, adobe, affiliate scheme, footprint, risk management, risk, vulnerabilities, dmca, digital millennium copyright act, adobe reader, usability, encryption, security
     LockLizard
By: Dell SecureWorks     Published Date: Sep 09, 2013
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Tags : dell, dell secureworks, risk consulting, cyber security, security, security breach, counter threat unit
     Dell SecureWorks
By: EVault     Published Date: Mar 21, 2014
This simple, practical white paper will prove invaluable whether you’re starting fresh or looking to upgrade your current data protection system.
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
     EVault
By: EVault     Published Date: Mar 21, 2014
Er zijn heel veel manieren om uw data te back-uppen – dan is het goed om te weten dat 12 Best Practices ze allemaal beslaan. Als u dit compacte whitepaper leest, kunt u in een paar minuten: •Bepalen of uw back-up en recovery systeem voldoet •Specifieke stappen bepalen om verbeteringen aan te brengen •Efficiëntie, betrouwbaarheid en kosten-effectiviteit verhogen Vul uw gegevens in en download
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
     EVault
By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : cybersecurity, security risk, security ratings, security, it management, enterprise applications, data management, it career advancement, business technology
     BitSight Technologies
By: EVault     Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de: •Déterminer si votre système de sauvegarde et de restauration est limite •Identifier les différentes étapes spécifiques pour mettre en avant les améliorations •Etre moteur en terme d'efficacité, de fiabilité et de rentabilité Inscrivez-vous pour télécharger.
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
     EVault
By: EVault     Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de: •Déterminer si votre système de sauvegarde et de restauration est limite •Identifier les différentes étapes spécifiques pour mettre en avant les améliorations •Etre moteur en terme d'efficacité, de fiabilité et de rentabilité Inscrivez-vous pour télécharger.
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
     EVault
By: CopiaTECH     Published Date: Mar 18, 2008
Larger businesses have more to lose in terms of absolute dollars, but it is the narrow profit margin under which smaller businesses work which makes it important for them to have their information backed up. Learn how to protect your small business in this guide.
Tags : copiatech, security
     CopiaTECH
By: Tyco Integrated Security     Published Date: Dec 08, 2014
Business protection should never be taken lightly, but it can be tough to know where to begin. This checklist is a way to get you started, helping you safeguard your company.
Tags : business protection, intrusion, vandalism, theft, security
     Tyco Integrated Security
By: Quinstreet - Infosec     Published Date: Jun 11, 2012
The Magic Quadrant evaluates vendors based on their Completeness of Vision and Ability to Execute and positions them in one of the following quadrants: Leaders, Challengers, Visionaries or Niche Players. Receive your complimentary white paper Now!
Tags : security, enterprise applications
     Quinstreet - Infosec
By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Ponemon Institute presents the findings of The Insecurity of Privileged Users - outlines the current threats to an organization's sensitive and confidential data created by a lack of control and oversight of privileged users in the workplace.
Tags : security, enterprise applications
     Quinstreet - Infosec
By: IBM     Published Date: Oct 09, 2012
Insights from the 2012 Global Reputational Risk and IT Study: How security, business continuity and technical support can shape the reputation and value of your company.
Tags : security risks, it security, reputational risk, business continuity, infographic, ibm, security, business technology
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com