Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 1316Sort Results By: Published Date | Title | Company Name
White Paper Published By: Entrust     Published Date: Jan 24, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, cloud access, digital security, security software
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
Know the truth: Mobile devices more secure than traditional PCs
Tags : 
entrust, mobile devices, mobile, security, mobile security
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : 
entrust, security, mobile security, infographic, malware
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
Mobile Security Gains Traction as Enterprises Embrace New Technology
Tags : 
entrust, security, mobile, mobile security, mobile devices
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
The Deprecation of Internal Server Names and Reserved IP Addresses
Tags : 
entrust, fqdn's, security, internal server, reserved ip addresses
    
Entrust
White Paper Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
The incredible reach of social media can be used to nurture business relationships and nourish invaluable customer relationships. But without an enterprise-wide security strategy, your organization is susceptible to a variety of internal and external threats, including account hijackings, malware and employee errors that can lead to brand and communication crises.
Tags : 
social media, social media management, enterprise, global, security
    
uberVU via HootSuite
White Paper Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide
    
uberVU via HootSuite
White Paper Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Download this simple, five-step guide now, to help your brand avoid security pitfalls. Ensure that your team takes the right steps to safely unleash the power of social media.
Tags : 
social media, social media management, enterprise, social media security, security
    
uberVU via HootSuite
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Tags : 
cisco, security, next-gen threat defense, byod, saas
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Miercom Lab Testing Summary Report
Tags : 
cisco, miercom lab, asa 5500-x series, adaptive security appliances, check point 4210
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Comprehensive network visibility and control increases business efficiency and enables business growth while maximizing security.
Tags : 
cisco, next-generation firewall, byod, bring your own devise, security
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Cloud Web Security Using Cisco ASA Technology Design Guide
Tags : 
cisco, cloud web security, security, cisco asa, cvd
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Email Security Using Cisco ESA Technology Design Guide
Tags : 
cisco, emial security, cisco validated designs, cvds, security
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
With email at the heart of businesses, security is a top priority. Mass spam and malware campaigns are no longer the only email security concern. Today, they are one part of a complex picture that includes other inbound threats and outbound risks.
Tags : 
cisco, security, virus attacks, email security, malware
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
How Cisco Web Security enables better data and brand protection for today’s enterprises.
Tags : 
cisco, security, web threats, pervasive security, cisco web security
    
Cisco
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security
    
CA Technologies
White Paper Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration
    
SafeNet
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.