Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 301 - 325 of 4738Sort Results By: Published Date | Title | Company Name
White Paper Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der whrend des vergangenen Jahres verzeichneten ffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverstndliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen berblick ber das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The Cybersecurity and Data Theft Prevention report provides a non-technical overview every board of directors can use to assess their organizations security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datenstze durch Verletzungen der Datenintegritt kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschtzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorflle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, whrend Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application, anti spam
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financires et juridiques des cyber-incidents hautement mdiatiss de lanne dernire ont envoy un message clair : le vol de donnes est trop important pour que le Conseil dadministration ne soit pas impliqu. Le rapport Cyberscurit et prvention du vol de donnes fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour valuer les mesures de scurit actuelles de sa socit.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Insight     Published Date: May 16, 2016
This paper shows how Insights cloud expertise, licensing knowledge and customer engagement remove disaster recovery and compliance headaches for leading online knowledge solutions company and enable 24-hour email access for its employees.
Tags : 
cloud, cloud computing, cloud-based solutions, disaster recovery, insight
    
Insight
White Paper Published By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : 
application protection, app protection, security, cloud, cloud computing
    
F5
White Paper Published By: F5     Published Date: May 12, 2016
This white paper illustrates the benefits of implementing F5.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
White Paper Published By: F5     Published Date: May 12, 2016
This white paper reveals the results of implementing F5 were it provided intelligent and agile Infrastructure, highly available and secure application services and manage applications in the hybrid environment.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
White Paper Published By: Adobe     Published Date: May 12, 2016
This white paper reveals the reason why integrating electronic signatures into the B2B sales cycle will save you both time and money.
Tags : 
esignature, digital signature, online signature, electronic signature, benefits of using esignatures
    
Adobe
White Paper Published By: Adobe     Published Date: May 12, 2016
This paper reveals the benefits of using e-signatures.
Tags : 
esignature, digital signature, online signature, electronic signature, benefits of using esignatures
    
Adobe
White Paper Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Labs GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution optionsconventional agent-based; agentless; and Light Agent as well as possible scenarios for aligning the right security approach to your organizations virtual environment.
Tags : 
kaspersky, virtualization security, security management, light agent, server virtualization
    
Kaspersky
White Paper Published By: SAP     Published Date: May 05, 2016
Executive Summary of the CFO.com Webinar
Tags : 
sap, ariba, e-payments, b2b, security
    
SAP
White Paper Published By: SAP Ariba     Published Date: May 05, 2016
Executive Summary of the CFO.com Webinar
Tags : 
sap, ariba, e-payments, b2b, security
    
SAP Ariba
White Paper Published By: Rsam     Published Date: Apr 28, 2016
The University of Rochester Medical Center (URMC) is of the nations top academic medical centers. Their InfoSec team wanted to implement a program that could withstand constant shifts in regulatory requirements while protecting the sanctity of patient health information. Learn why the selected Rsam and the results of their successful implementation.
Tags : 
rsam, university of rochester, security incident response, successful implementation, security
    
Rsam
Webinar Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment, security
    
Rsam
White Paper Published By: YLD     Published Date: Apr 27, 2016
IT departments are faced with new challenges, with increased competition, lower customer loyalty and globalisation. It all requires faster development while dealing with shadow IT, legacy systems and requirements for highly skilled teams, with expertise in new, disruptive technologies.
Tags : 
it department, customer loyalty, technology, it support, becoming a disruptive cio
    
YLD
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management
    
Adobe
White Paper Published By: Code42     Published Date: Apr 22, 2016
The studys findings highlight discrepanciesbetween IT departments and end usersin the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups, anti spyware
    
Code42
White Paper Published By: Adobe     Published Date: Apr 22, 2016
This white paper uncovers the numerous document productivity features that employees want across PCs and mobile devices.
Tags : 
mobility, mobile devices, cloud, cloud-based, cloud-based productivity apps
    
Adobe
White Paper Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.