Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3434Sort Results By: Published Date | Title | Company Name
White Paper Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information
    
Kaspersky Lab
White Paper Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information
    
Kaspersky Lab
White Paper Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Download Kaspersky Labs Security for Virtualization: Getting the Balance Right to answer your most pressing questions.
Tags : 
kaspersky, virtualization, security, virtual environment, business protection
    
Kaspersky Lab
White Paper Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Labs Top 10 Tips for Educating Employees about Cybersecurity to learn more.
Tags : 
kaspersky, cybersecurity, employee knowledge, internet safety, cybercrime
    
Kaspersky Lab
White Paper Published By: Kaspersky Lab     Published Date: Dec 12, 2014
For virtualization security, theres no one size fits all solutionand trying to fit your organizations specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization? A new whitepaper from Kaspersky Lab, "Virtualization Security Options: Choose Wisely" will tell you.
Tags : 
kaspersky, virtualization, security, virtual environment, business protection
    
Kaspersky Lab
Free Offer Published By: F5 Networks     Published Date: Dec 10, 2014
Virtualization caused a major cultural shift in IT. By enabling physical assets to be better utilized, IT teams realized that they could deliver systems to their customers in a more timely manner, thereby delivering better value. In this webinar you will learn what is NetOps and how is it different from DevOps.
Tags : 
f5 networks, devops, agile, netops, data center
    
F5 Networks
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Business protection should never be taken lightly, but it can be tough to know where to begin. This checklist is a way to get you started, helping you safeguard your company.
Tags : 
business protection, intrusion, vandalism, theft, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
In order to protect your business against a potential burglary, it pays to get in the mind of a burglar. So we did just that.
Tags : 
intrusion, vandalism, theft, burglary, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Lock and key is the most traditional access control measure, but its not without its security gaps. There are other access control measures that can help you streamline your business in ways you may never have considered.
Tags : 
access control, business protection, security, business intelligence, business management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
From burglars to your own employees, theft can rock your bottom line. Learn what you can do to protect your business.
Tags : 
intrusion, theft, burglary, security, business intelligence
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Todays systems are better at detecting fires than ever before, yet theyre more complex and require maintenance in order to be effective. One missed inspection or instance of deferred maintenance can result in a system that doesnt work when you need it most. Learn how you can fireproof your business and protect your company and employees.
Tags : 
business protection, fire safety, security, best practices
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Do you know how safe your business is? Discover the crime trends and statistics from across the United States that all business owners should know.
Tags : 
intrusion, vandalism, theft, burglary, security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Examine this map and discover the dangers from external and internal threats that might apply to you. From both internal and external threats, see what hazards exist so you can protect your livelihood.
Tags : 
business protection, security, burglary, vandalism, business intelligence
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Safeguarding your business doesnt have to be a long, time-consuming endeavor. Through mobile security management, you can improve visibility with real-time alerts and video clips.
Tags : 
remote security, business protection, security, business intelligence, business management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Todays security camera systems are extremely reliable, yet a mere out-of-focus lens can still completely destroy all hope of catching your culprit and saving your resources. See what routine camera maintenance requires, and learn how you can be sure your inspections are thorough.
Tags : 
security cameras, theft, security, business intelligence, business management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Make the most out of your security technology. Learn six ways you can achieve higher profits by taking full advantage of your security system and the information it gathers.
Tags : 
cost savings, business intelligence, security, productivity
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : 
video surveillance, access control, business intelligence, security, best practices
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Running a business is hard. So dont make it even harder on yourself by piling on security tasks without involving an outside expert.
Tags : 
business protection, intrusion, fire safety, security, business intelligence
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Start protecting your company with a small piece of technology that 85% of business owners tow around as their life force: your smartphone. Discover how making your business more secure can be as simple as it is vital.
Tags : 
remote security, business protection, security, mobile data systems, mobile workers
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
In order to get you started, weve consulted the experts. Learn how you can begin moving your company in a secure direction with these three basic steps.
Tags : 
business protection, security, theft, crime, business intelligence
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
When theft or violence is mixed with your bottom line, the damage can go way beyond physical and monetary consequences. Weve outlined some ways you can begin eliminating both internal and external threats.
Tags : 
business protection, workplace violence, burglary, employee theft, business management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Establishing a thriving business takes dedication and hard work, yet that can easily be destroyed without taking precautionary measures. To create more safety awareness, weve listed the top five vulnerabilities business owners face every day.
Tags : 
robbery, burglary, theft, liability, fire safety
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
The cloud is no longer just for deploying software its now transforming the way companies physically secure their business. Learn how you can future-proof your business and secure your company with the flexibility of the cloud and the latest security know-how.
Tags : 
video security, cloud, business protection, security, business intelligence
    
Tyco Integrated Security
White Paper Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 04, 2014
This white paper explains why PKI is the key to the future of trust on the Internet; what steps must be taken to build a stronger, more trustworthy PKI ecosystem.
Tags : 
pki, pki ecosystem, browser developers, internet security, security
    
Symantec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.