Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 4030Sort Results By: Published Date | Title | Company Name
White Paper Published By: Tenable Network Security     Published Date: Jul 23, 2015
Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.
Tags : 
risk management, cybersecurity, asset visibility, active scanning, risk blind spot
    
Tenable Network Security
White Paper Published By: Tenable Network Security     Published Date: Jul 23, 2015
This paper talks about IT security challenges within the healthcare industry.
Tags : 
compliance, healthcare organizations, mobility, medical technology, security management
    
Tenable Network Security
White Paper Published By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : 
vendor risk management, vrm, risk management program, penetration tests, risk management strategy
    
BitSight Technologies
White Paper Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : 
shadow it, hybrid cloud management, visibility, network security, cloud traffic
    
XO Communications
Case Study Published By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : 
gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
    
XO Communications
Case Study Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : 
xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking
    
XO Communications
White Paper Published By: IBM     Published Date: Jul 22, 2015
Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : 
productivity, customer service, automation, automated financial transactions, compliance
    
IBM
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology, networking
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Dont be that guy. The one who downloads every app he sees. You wouldnt order a dish in a restaurant without knowing whats inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro Worry-Free Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection
    
CDW-Trend Micro
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Citrix XenApp helps people be productive.
Tags : 
productivity, business applications, security, mobile platforms, development
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Why app and desktop virtualization should be the foundation for your layered approach.
Tags : 
information security, layered approach, mobility, application, desktop virtualization
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Adoption of mobile devices continues to expand.
Tags : 
windows, applications, platform, security, performance
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Reduce the work need to provide better security.
Tags : 
data, data protection, access control, security task, application
    
Citrix Systems
White Paper Published By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : 
database vulnerability, proactive strategies, data protection, compliance, data breach
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : 
big data security, data privacy, data protection, sensitive data, data risk management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : 
data security, compliance, data protection, data privacy, safeguarding information
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.
Tags : 
endpoint management, path compliance, lifecycle management, patch management, vulnerability management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : 
data protection, mobility, endpoint management, governance policies, consumerization
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
Examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of todays cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.