Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 4102Sort Results By: Published Date | Title | Company Name
Live Event Published By: The Institute for Health Technology Transformation     Published Date: Sep 29, 2015
This summit is a unique learning opportunity and offers the ability to connect and be face-to-face with the nation's top HIT thought leaders. The discussions will feature thought leaders and industry experts. *Fee Required*
Tags : 
ny summit, health conference, latest trends, health events, heath technology
    
The Institute for Health Technology Transformation
White Paper Published By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : 
sage, emv payments, credit card processing, processing terminals, data security standards
    
Sage
White Paper Published By: Silanis     Published Date: Aug 30, 2015
Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.
Tags : 
silanis, esignlive, electronic signature, regulatory compliance, compliance
    
Silanis
White Paper Published By: TigerText     Published Date: Aug 30, 2015
Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.
Tags : 
tigertext, tiger text, byod, hippa compliance, patient data
    
TigerText
White Paper Published By: Intralinks     Published Date: Aug 28, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations.
Tags : 
security, it management, knowledge management, data management
    
Intralinks
White Paper Published By: Intralinks     Published Date: Aug 28, 2015
They say content is king. But if your content isnt protected, its a king with no clothes.
Tags : 
security, it management, knowledge management, data management
    
Intralinks
White Paper Published By: Intralinks     Published Date: Aug 28, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin?
Tags : 
security, it management, data management
    
Intralinks
White Paper Published By: Kaspersky     Published Date: Aug 27, 2015
Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.
Tags : 
kaspersky, attacks, cyberattacks, business process, security costs
    
Kaspersky
White Paper Published By: Internap     Published Date: Aug 26, 2015
This white paper will focus on public cloud Infrastructure-as-a-Service (IaaS), including virtual and bare-metal cloud solutions.
Tags : 
public cloud infrastructure, iaas, bare metal cloud solution, virtual cloud solution, cloud computing
    
Internap
White Paper Published By: Google     Published Date: Aug 26, 2015
La mobilit e il cloud oggi sono considerate le tecnologie pi critiche per il luogo di lavoro. Trasformano inoltre il ruolo del CIO perch l'IT diventa un partner strategico per il business e passa da strumento per l'implementazione a motore.
Tags : 
workplace innovation, google for work, mobility, personal technology, security
    
Google
Webinar Published By: Pluralsight     Published Date: Aug 20, 2015
OWASP Top 10 "The Big Picture" is all about understanding the top 10 web security risks we face on the web today in an easily consumable, well-structured fashion that aligns to the number one industry standard on the topic today.
Tags : 
web security risks, top 10 risks, security, top security risks, it management
    
Pluralsight
White Paper Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartners yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 13, 2015
Whether youre part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : 
alienvault, security, soc, hacking, threat detection
    
AlienVault
Webinar Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
White Paper Published By: Arcserve     Published Date: Aug 12, 2015
This survey provides insight into the Data Protection landscape across Asia Pacific. Most notably the results point to IT departments across APAC in a state of transition. While legacy methods for data protection are still heavily used, we see that a tipping point has been reached and in most instances the majority of users have moved to newer technologies in the data protection strategies.
Tags : 
data protection trends, arcserve, smb, data protection landscape, legacy data protection
    
Arcserve
White Paper Published By: Box     Published Date: Aug 11, 2015
This white paper reveals how CIOs are deploying an array of mobile content security technologies, giving them a robust platform upon which to build as their mobile usage expands.
Tags : 
mobility, mobile security, security technology, mobile for work, mobile
    
Box
Case Study Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : 
cyberattacks, security, data security, cryptographic keys, digital certificates
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : 
cyberattacks, security, cybercriminals, security application, access control
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 07, 2015
Most organisations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative.
Tags : 
eliminate blind spots, ssl, security, security application, anti spam
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 07, 2015
Public key infrastructure (PKI) is the foundation of todays enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.
Tags : 
pki refresh, public key infrastructure, system errors, system updates, automated key securit
    
Venafi
White Paper Published By: CDW     Published Date: Aug 07, 2015
VMware vCloud Hybrid Service Disaster Recovery introduces native cloud-based disaster recovery capabilities for VMware vSphere virtual environments.
Tags : 
cloud, disaster recovery, hybrid, service, data protection
    
CDW
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.