Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3197Sort Results By: Published Date | Title | Company Name
Live Event Published By: ForgeRock     Published Date: Aug 27, 2014
Join us for this Gigaom Research Webinar on Wednesday, August 27, 2014, at 10 a.m. PT; we will examine the immediate need to extend identity to customer audiences, the risks of doing so using legacy software, and the most effective path businesses can take to build for the future while recognizing value today.
Tags : 
forgerock, api, customer service, crm, business intelligence
    
ForgeRock
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper breaks down the main features of the Box mobile app.
Tags : 
box, mobile content experience, sales mobility, presentation software, work on the go
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper breaks down the main features of the Box mobile app
Tags : 
box, mobile content experience, sales mobility, presentation software, work on the go
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, application security
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, application security
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.
Tags : 
box, security, cloud services, cross team collaboration, enterprise content collaboration
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.
Tags : 
box, security, cloud services, cross team collaboration, enterprise content collaboration
    
Box
White Paper Published By: Kaspersky Lab     Published Date: Aug 14, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, its imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
kaspersky, kaspersky lab, security, cyberthreats, corporate cyberthreats
    
Kaspersky Lab
White Paper Published By: McAfee     Published Date: Aug 14, 2014
Read this report to get a solid overview of Advanced Evasion Techniques (AET) and how they behave, along with some brilliant Industry Insights.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
Are you using the latest tools to guarantee your network survives an attack? Have you automated routine tasks, simplified upgrades and implemented plug-and-play deployment capability? Here are eight best practices for managing your network security.
Tags : 
firewall management, ngfw, next generation firewall, firewall resource, firewall staff
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : 
url filter, firewall url, web filtering, website blocking, white listing
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
Tags : 
next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.
Tags : 
esg, esg lab, firewall evaluation, firewall lab report, firewall test
    
McAfee
White Paper Published By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization
    
McAfee
White Paper Published By: Box     Published Date: Aug 13, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, enterprise applications
    
Box
White Paper Published By: Box     Published Date: Aug 13, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
White Paper Published By: Box     Published Date: Aug 13, 2014
This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.
Tags : 
box, security, cloud services, cross team collaboration, enterprise content collaboration
    
Box
White Paper Published By: Box     Published Date: Aug 13, 2014
This paper breaks down the main features of the Box mobile app
Tags : 
box, mobile content experience, sales mobility, presentation software, work on the go
    
Box
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.