Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 26 - 50 of 4738Sort Results By: Published Date | Title | Company Name
White Paper Published By: Mimecast     Published Date: Dec 29, 2016
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
Tags : 
mimecast, security, ransomware, cybersecurity
    
Mimecast
White Paper Published By: Citrix ShareFile     Published Date: Nov 09, 2016
There are many headlines about security challenges but first impressions can be deceiving.
Tags : 
networking, security, it management, wireless, knowledge management
    
Citrix ShareFile
White Paper Published By: F5 Networks Inc     Published Date: Oct 12, 2016
Access this report now to see how Gartner evaluates vendors based on ability to execute and completeness of vision.
Tags : 
gartner, magic quadrant, application delivery, adc, cloud
    
F5 Networks Inc
White Paper Published By: Adobe     Published Date: Oct 05, 2016
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
security, security application, cloud, cloud computing, cloud security
    
Adobe
White Paper Published By: Adobe     Published Date: Oct 05, 2016
This paper explores electronic and digital signatures and shows how Adobe solutions let you work with either approach, or a combination of the two.
Tags : 
digital signature, e-signature, online signature, adobe, digital signatures
    
Adobe
White Paper Published By: Adobe     Published Date: Oct 05, 2016
This paper explores electronic and digital signatures and shows how Adobe solutions let you work with either approach, or a combination of the two.
Tags : 
digital signature, e-signature, online signature, adobe, digital signatures
    
Adobe
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Tags : 
ibm, maas360, mobile, security, mobile security
    
IBM MaaS360
White Paper Published By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of todays cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
mimecast, email, email security, cyber security, whaling
    
Mimecast
White Paper Published By: Mimecast     Published Date: Aug 30, 2016
Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
mimecast, email, cloud, email archiving, email
    
Mimecast
White Paper Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : 
ssl, tsl, cyber threats, network security, security
    
F5 Networks Inc
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
Mobile is the new playground for thieves: How to protect against mobile malware
Tags : 
ibm, mobile, security, mobility, mobile computing
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
Best practices for mobile application lifecycle management: Security from design through deployment
Tags : 
ibm, mobile, mobile applications, application lifecycle, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security, wireless
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : 
ibm, bring your own device, byod, mobile, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
A humorous look at ITs challenges in managing Bring Your Own Device (BYOD) for todays organizations
Tags : 
ibm, mobile, mobile device management, mdm, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
Enable secure access to critical data and applications, while mitigating the risk of mobile malware
Tags : 
ibm, mobile, ciso, mobile security, security
    
IBM MaaS360
White Paper Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacksalso known as CEO fraud or whaling attacksare a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think youre safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threatsand how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security
    
Mimecast
White Paper Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats
    
Mimecast
White Paper Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats
    
Mimecast
White Paper Published By: Mimecast     Published Date: Jan 15, 2016
Learn Office 365 Migration Risks and How to Avoid a SaaS Monoculture.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup
    
Mimecast
White Paper Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa, hipaa compliance
    
FORTRUST
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security
    
IBM MaaS360
White Paper Published By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft Office 365 has its risks. In this white paper youll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup
    
Mimecast
White Paper Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data
    
Adlib Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.