Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 1798Sort Results By: Published Date | Title | Company Name
White Paper Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
This document will identify the key questions you should ask your advanced malware protection vendor, and show you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
sourcefire, antimalware protection, network protection, evolving threats, antimalware vendors
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : 
sourcefire, firesight, management center, context aware, adaptive security
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp
    
Cisco
White Paper Published By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : 
actiance, gartner, magic quadrant, enterprise information archiving, cagr
    
Actiance, Inc.
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses the Office 365 platform, its applicability for organizations of all sizes, and the need for third-party solutions which complement the platform to maintain a strong security posture.
Tags : 
office 365, osterman research, security for office 365, security
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This brief discusses how hybrid email protection can address your privacy concerns while still gaining the benefits of cloud-based email security.
Tags : 
hybrid email security, mcafee email protection, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This infographic outlines the results of the McAfee Phishing Quiz.
Tags : 
mcafee email phishing quiz, email phishing, spear phishing, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
Gartner recognizes McAfee as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on July 1, 2014.
Tags : 
gartner magic quadrant, secure email gateways, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.
Tags : 
gartner magic quadrant, secure web gateways, mcafee web gateway, advanced threat defense, security
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This white paper guides you through the pros and cons of direct vs. transparent proxies and makes recommendations that will help you secure your company and your users more effectively.
Tags : 
secure web gateway, direct or transparent proxy, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This white paper describes a wide range of Internet-based attack methods and explains how Web Protection technology protects against them.
Tags : 
secure web gateway, web protection, gateway anti-malware engine, advanced threat defense, application control
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This paper characterizes web threats and explains why most security solutions in place today are ineffective.
Tags : 
web security, web protection, mcafee web gateway, mcafee saas web protection, mcafee data loss prevention
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This report takes a look at the state of “shadow IT” in companies worldwide and reveals some surprising results.
Tags : 
shadow it, frost & sullivan, security, it management
    
McAfee
White Paper Published By: Kaseya     Published Date: Nov 12, 2014
While there are an innumerable number of ways you could improve your business’s information security posture, for the sake of brevity let’s shorten that list to the methods which often provide great benefits. Here are five ways that you can help your business reduce the chance of being victimized by cybercrime.
Tags : 
kaseya, cybercrime, reduce risk, cyber attacks, audits
    
Kaseya
White Paper Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration
    
Centrify Corporation
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network
    
Citrix Systems
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.