Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 1313Sort Results By: Published Date | Title | Company Name
White Paper Published By: Lumension     Published Date: Feb 07, 2014
Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.
Tags : 
lumension, server performance, server security, application control, anti-virus solutions
    
Lumension
White Paper Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution
    
Lumension
White Paper Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software
    
Lumension
White Paper Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes
    
Lumension
Webinar Published By: Lumension     Published Date: Feb 07, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks
    
Lumension
White Paper Published By: Fortinet     Published Date: Feb 04, 2014
In 2012, NSS Labs found that most available NGFW solutions “fell short in performance and security effectiveness.” In 2013 NSS Labs noted “marked improvement” and bestowed their “recommended” rating on 6 vendors. Please download the white paper to find out who they were.
Tags : 
fortinet, ngfw, next generation firewall, nss labs, security
    
Fortinet
Webinar Published By: Fortinet     Published Date: Feb 04, 2014
Next Generation Firewall (NGFW). It seems every IT Security expert is talking about them, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment.
Tags : 
ngfw, next generation firewall, fortinet, security, it management
    
Fortinet
Webinar Published By: Fortinet     Published Date: Feb 04, 2014
With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions.
Tags : 
ngfw, next generation firewall, fortinet, security, it management
    
Fortinet
White Paper Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware
    
Webroot UK
White Paper Published By: Entrust     Published Date: Jan 24, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, cloud access, digital security, security software
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
Know the truth: Mobile devices more secure than traditional PCs
Tags : 
entrust, mobile devices, mobile, security, mobile security
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : 
entrust, security, mobile security, infographic, malware
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
Mobile Security Gains Traction as Enterprises Embrace New Technology
Tags : 
entrust, security, mobile, mobile security, mobile devices
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 24, 2014
The Deprecation of Internal Server Names and Reserved IP Addresses
Tags : 
entrust, fqdn's, security, internal server, reserved ip addresses
    
Entrust
White Paper Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
The incredible reach of social media can be used to nurture business relationships and nourish invaluable customer relationships. But without an enterprise-wide security strategy, your organization is susceptible to a variety of internal and external threats, including account hijackings, malware and employee errors that can lead to brand and communication crises.
Tags : 
social media, social media management, enterprise, global, security
    
uberVU via HootSuite
White Paper Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide
    
uberVU via HootSuite
White Paper Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Download this simple, five-step guide now, to help your brand avoid security pitfalls. Ensure that your team takes the right steps to safely unleash the power of social media.
Tags : 
social media, social media management, enterprise, social media security, security
    
uberVU via HootSuite
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Tags : 
cisco, security, next-gen threat defense, byod, saas
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Miercom Lab Testing Summary Report
Tags : 
cisco, miercom lab, asa 5500-x series, adaptive security appliances, check point 4210
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Comprehensive network visibility and control increases business efficiency and enables business growth while maximizing security.
Tags : 
cisco, next-generation firewall, byod, bring your own devise, security
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Cloud Web Security Using Cisco ASA Technology Design Guide
Tags : 
cisco, cloud web security, security, cisco asa, cvd
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Email Security Using Cisco ESA Technology Design Guide
Tags : 
cisco, emial security, cisco validated designs, cvds, security
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
With email at the heart of businesses, security is a top priority. Mass spam and malware campaigns are no longer the only email security concern. Today, they are one part of a complex picture that includes other inbound threats and outbound risks.
Tags : 
cisco, security, virus attacks, email security, malware
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
How Cisco Web Security enables better data and brand protection for today’s enterprises.
Tags : 
cisco, security, web threats, pervasive security, cisco web security
    
Cisco
White Paper Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security
    
CA Technologies
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.