Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1460Sort Results By: Published Date | Title | Company Name
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Business protection should never be taken lightly, but it can be tough to know where to begin. This checklist is a way to get you started, helping you safeguard your company.
Tags : 
business protection, intrusion, vandalism, theft, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
In order to protect your business against a potential burglary, it pays to get in the mind of a burglar. So we did just that.
Tags : 
intrusion, vandalism, theft, burglary, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Lock and key is the most traditional access control measure, but itís not without its security gaps. There are other access control measures that can help you streamline your business in ways you may never have considered.
Tags : 
access control, business protection, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
From burglars to your own employees, theft can rock your bottom line. Learn what you can do to protect your business.
Tags : 
intrusion, theft, burglary, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Todayís systems are better at detecting fires than ever before, yet theyíre more complex and require maintenance in order to be effective. One missed inspection or instance of deferred maintenance can result in a system that doesnít work when you need it most. Learn how you can fireproof your business and protect your company and employees.
Tags : 
business protection, fire safety, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Do you know how safe your business is? Discover the crime trends and statistics from across the United States that all business owners should know.
Tags : 
intrusion, vandalism, theft, burglary, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Examine this map and discover the dangers from external and internal threats that might apply to you. From both internal and external threats, see what hazards exist so you can protect your livelihood.
Tags : 
business protection, security, burglary, vandalism
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Safeguarding your business doesnít have to be a long, time-consuming endeavor. Through mobile security management, you can improve visibility with real-time alerts and video clips.
Tags : 
remote security, business protection, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Todayís security camera systems are extremely reliable, yet a mere out-of-focus lens can still completely destroy all hope of catching your culprit and saving your resources. See what routine camera maintenance requires, and learn how you can be sure your inspections are thorough.
Tags : 
security cameras, theft, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Make the most out of your security technology. Learn six ways you can achieve higher profits by taking full advantage of your security system and the information it gathers.
Tags : 
cost savings, business intelligence, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : 
video surveillance, access control, business intelligence, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Running a business is hard. So donít make it even harder on yourself by piling on security tasks without involving an outside expert.
Tags : 
business protection, intrusion, fire safety, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Start protecting your company with a small piece of technology that 85% of business owners tow around as their life force: your smartphone. Discover how making your business more secure can be as simple as it is vital.
Tags : 
remote security, business protection, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
In order to get you started, weíve consulted the experts. Learn how you can begin moving your company in a secure direction with these three basic steps.
Tags : 
business protection, security, theft, crime
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
When theft or violence is mixed with your bottom line, the damage can go way beyond physical and monetary consequences. Weíve outlined some ways you can begin eliminating both internal and external threats.
Tags : 
business protection, workplace violence, burglary, employee theft, business management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Establishing a thriving business takes dedication and hard work, yet that can easily be destroyed without taking precautionary measures. To create more safety awareness, weíve listed the top five vulnerabilities business owners face every day.
Tags : 
robbery, burglary, theft, liability, fire safety
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
The cloud is no longer just for deploying software Ė itís now transforming the way companies physically secure their business. Learn how you can future-proof your business and secure your company with the flexibility of the cloud and the latest security know-how.
Tags : 
video security, cloud, business protection, security
    
Tyco Integrated Security
White Paper Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
This white paper explains why PKI is the key to the future of trust on the Internet; what steps must be taken to build a stronger, more trustworthy PKI ecosystem.
Tags : 
pki, pki ecosystem, browser developers, internet security, security
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.
Tags : 
ssl, http, firesheep, side-jacking, wi-fi attacks
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks.
Tags : 
web servers, code-signing, malware, software, code-signing certificates
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation.
Tags : 
ssl/tls, sdks, apis, quick guide, apps
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.
Tags : 
spoofing, phishing, identity theft, lax website, cybercrime
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
With 93% of people doing at least some of their holiday-season shopping with online merchants, e-tailers of every kind need to get their websites in gear and ensure their customers feel confident shopping on their site. Whether itís shopping online, in store pick-up, or even browsing and wish lists, customers are offering you an unprecedented amount of data and sales this season. But fail to keep your customers safe with good website security, and all youíll get is a lump of coal in your stocking.
Tags : 
online merchants, e-tailers, holiday, holiday season, website security
    
Symantec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.