Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3232Sort Results By: Published Date | Title | Company Name
Live Event Published By: Radix FZC     Published Date: Sep 10, 2014
Watch this Live Event on Wednesday September 10th at 2pm EST to learn how you can start using .host, and engage its key benefits to give you a branding and marketing edge.
Tags : 
radix, radix registry, icann, .host, global hosting
    
Radix FZC
White Paper Published By: SilverSky     Published Date: Aug 27, 2014
Learn how your company can increase their security by adopting this holistic approach.
Tags : 
silversky, security, targeted attacks, retail security, security infrastructure
    
SilverSky
White Paper Published By: Neustar     Published Date: Aug 27, 2014
DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property.
Tags : 
ddos attacks, it security, data breaches, ddos impact report, application security
    
Neustar
White Paper Published By: Workday     Published Date: Aug 27, 2014
This paper provides a clear insight into the real SaaS manifesto
Tags : 
saas manifesto, in the cloud, saas security, saas definition, networking
    
Workday
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper debunks 7 virtualization DR myths
Tags : 
virtualization myths, disaster recovery, back up, high availability, virtual servers
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper will help you navigate the virtualization solutions available and explain how Hyper-V can benefit you.
Tags : 
backup, high availability, disaster recovery, virtualization software, hyper-v
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.
Tags : 
systems migrations, business downtime, system migration, business continuity, vision solutions
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper will lead you through 3 essential steps to help ensure business continuity and survival.
Tags : 
guide to recovery, business continuity, disaster recovery, downtime, business impact of downtime
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper explores the market leading solutions available for data protection and recoverability.
Tags : 
data protection, data recovery, geocluster, data cluster. failover clustering, storage
    
Vision Solutions
White Paper Published By: Riverbed     Published Date: Aug 22, 2014
Businesses rely on SharePoint availability and performance. This infographic shows the impact of SharePoint slowdowns, challenges with delivering SharePoint and recommendations for an effective SharePoint deployment.
Tags : 
business performance, sharepoint availability, performance, challenges, delivery
    
Riverbed
White Paper Published By: Brocade Communications Systems     Published Date: Aug 21, 2014
The limitations of traditional three-tier campus network architectures are being severely tested by peer-centered, wired/wireless, multi-device, and multi-application environments running rich media like streaming video and audio.These legacy networks are inflexible, inefficient, and have high OpEx costs.1
Tags : 
campus networks, wired, wireless, multi-device, multi-application
    
Brocade Communications Systems
White Paper Published By: Brocade Communications Systems     Published Date: Aug 21, 2014
The security of your campus network is essential to managing your organization's risk - and unlike the networking infrastructure of third-part service providers, the responsibility for campus network security falls primarily on your own organization. This report explains why security for your campus network is essential, and outlines three straightforward ways that you can improve it.
Tags : 
security, campus network, network, infrastructure, risk
    
Brocade Communications Systems
White Paper Published By: Brocade Communications Systems     Published Date: Aug 21, 2014
This white paper explores today's campus networking environment: its operational shortcomings and potential to address knowledge workers' growing needs. IT managers need to look to their near- and midterm future needs in terms of how a software-defined network architecture can provide incremental value to their IT and network infrastructure; why it is likely to be the foundation of next-generation enterprise networking solutions; the importance of open technologies and protocols such as OpenFlow; and how SDN will help better manage physical and virtual network resources to deliver a better application experience.
Tags : 
enterprise, campus network, sdn it, virtual, network architecture
    
Brocade Communications Systems
White Paper Published By: Brocade Communications Systems     Published Date: Aug 21, 2014
For the last two years, Software-Defined Networking (SDN) has been the hottest topic in networking. There is tremendous interest in SDN on the part of vendors and a wide range of user groups including hyper-scale data center providers, service providers and enterprises of all types and sizes. While most of the discussion of SDN focuses on its use in the data center, The 2013 Guide to Network Virtualization and SDN1 highlights the fact that enterprise IT organizations are interested in deploying SDN broadly throughout their environment, including in their WAN and campus networks.
Tags : 
security, hyper-scale, sdn, campus networks, wan
    
Brocade Communications Systems
White Paper Published By: McAfee     Published Date: Aug 21, 2014
Uma rede privada virtual (VPN, Virtual Private Network) proporciona o melhor retorno do investimento em proteção de comunicações. Porém, a falta de confiabilidade nos links da VPN é um fator de risco para comunicações críticas dentro das organizações. As redes constantemente disponíveis dependem de diversos provedores de serviços de Internet para garantir conectividade permanente e maior largura de banda. A aVPN (Augmented VPN) agrega todos os links dos provedores de serviços de Internet para disponibilizar um único túnel de alta capacidade. A aVPN é um modo simples e econômico de criar conexões rápidas, seguras e de alta capacidade entre sites, bem como garantir uma conectividade sem interrupções. Ela foi desenvolvida pensando na facilidade de uso e sua implementação não exige equipamentos/softwares especiais ou contratos de troca de tráfego com provedores de serviços de Internet.
Tags : 
vpn, rede privada virtual, firewall de próxima geração, mpls, bgp
    
McAfee
White Paper Published By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : 
data management strategies, data protection, system migrations, data safeguarding, backup and recovery
    
Vision Solutions
White Paper Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements
    
OpenText
White Paper Published By: OpenText     Published Date: Aug 19, 2014
While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems
    
OpenText
White Paper Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements
    
OpenText
Free Offer Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft
    
bitglass
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper breaks down the main features of the Box mobile app.
Tags : 
box, mobile content experience, sales mobility, presentation software, work on the go
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper breaks down the main features of the Box mobile app
Tags : 
box, mobile content experience, sales mobility, presentation software, work on the go
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, application security
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, application security
    
Box
White Paper Published By: Box     Published Date: Aug 15, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.