Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 4726 - 4738 of 4738Sort Results By: Published Date | Title | Company Name
White Paper Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider
    
Texas Instruments
White Paper Published By: Evolveware     Published Date: Nov 06, 2006
Software analysis, documentation, migration, upgrades or replacements are daunting and risky endeavors because they are primarily manual and time-consuming. EvolveWare’s S2T Technology provides a solution to these problems with tools that automate the process up to 90%, thus reducing the time and cost of such initiatives by as much as 40-60%.
Tags : 
software analysis, software documentation, software migration, migration, software upgrades
    
Evolveware
White Paper Published By: EMC     Published Date: Nov 06, 2006
The following tips can help you keep Exchange running smoothly and let you bounce back quickly from hardware failures that could threaten your Exchange server.
Tags : 
exchange server, top 10, exchange threat, exchange security, network security
    
EMC
White Paper Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs
    
EMC
White Paper Published By: EMC     Published Date: Nov 06, 2006
By utilizing the speed and reliability of the EMC CLARiiON® AX150 networked storage system and the convenience of EMC Retrospect® 7.5 for Windows backup and recovery software, SMBs can implement fast, effective, reliable data protection that is easy to set up and manage without placing undue strain on IT resources.
Tags : 
data protection, raid, disaster plan, disk-based, tape-based
    
EMC
White Paper Published By: EMC     Published Date: Nov 06, 2006
Offsite media can be lost or stolen while in transit, exposing sensitive information to potential misuse. By using AES encryption on backup data, a business can feel confident that sensitive customer information will remain safe and secure, even if the backups tapes are lost of stolen.
Tags : 
disaster plan, encryption, disk backup, tape backup, offsite storage
    
EMC
White Paper Published By: IBM     Published Date: Nov 06, 2006
Many forward-thinking organizations are beginning to see the true potential of the convergence of voice, video and data.  It has the power to transform business relationships, business processes and collaboration between employees, suppliers and customers.
Tags : 
convergence, network convergence, ip telephony, voip, communications convergence
    
IBM
White Paper Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Tags : 
backup, infrastructure, internetworking hardware, networking hardware, network management
    
Symantec
White Paper Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management
    
Castelle
White Paper Published By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : 
access control, identity management, access management, authentication, roi
    
A10 Networks
White Paper Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security
    
AirTight Networks
White Paper Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance
    
Secure Computing
Start   Previous    176 177 178 179 180 181 182 183 184 185 186 187 188 189 190     Next   End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.