Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3255Sort Results By: Published Date | Title | Company Name
Webinar Published By: Actuate     Published Date: Sep 25, 2014
This webinar on the 5 Best Practices for Designing Data-Driven Apps is hosted by Allen Bonde, VP of Product Marketing & Innovation, Actuate.
Tags : 
best practices for app design, app design webinar, designing data-driven apps, actuate, enterprise applications
    
Actuate
White Paper Published By: Foxit     Published Date: Sep 18, 2014
IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?
Tags : 
foxit, document management strategy, revenue generated technology, storage, security
    
Foxit
White Paper Published By: Arbor     Published Date: Sep 17, 2014
Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables
Tags : 
firewall, firewall protection, it security, cyber defense, security
    
Arbor
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
A single, unified solution for managing Macs and mobile devices, Centrify User Suite, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory, letting your IT department leverage existing expertise, tools and processes. By managing user identity and authentication in Active Directory, Centrify User Suite, Mac Edition, extends Group Policy-based security management to Mac and mobile users. In addition, the solution supports smart-card login to Active Directory by Mac users. Your employees reap the rewards that come with effortless access to information, applications and services. And the enterprise benefits from a unified, integrated management solution that maximizes security, streamlines operations and reduces cost.
Tags : 
parallel infrastructure, enterprise, centralized management, user identity and authentication, active directory
    
Centrify Corporation
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be “the most devastating” due to the amount of damage privileged users can inflict and the type of data they can access.
Tags : 
unified identity, hackers and outside attacks, accessible data, privileged users, employee negligence
    
Centrify Corporation
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
The major trends challenging IT organizations today are the increasing dissimilarities and hybridization of platforms inside and outside the organization. And the rush to deploy SaaS applications and the explosion in smart phone and tablet devices that users are bringing to work for personal productivity. This fractured identity environment results in significant management challenges for IT, and frustration and lower productivity for users forced to remember multiple usernames and passwords. Unified identity architecture ensures your on-premise Active Directory infrastructure can be securely leveraged to quickly bring servers (UNIX, Linux, and Windows), applications (on-premise, SaaS, and mobile) and endpoints (Mac and Mobile devices) into line with security best practice and compliance. This paper will cover the practical path of unified identity management across multiple platforms including data center, cloud, and mobile.
Tags : 
data center, cloud and mobile, saas applications, smart phone and tablet devices, directory infrastructure
    
Centrify Corporation
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
IT professionals are grappling with not one, but three revolutions at the same time. • First, cloud computing provides easy and dynamic access to information technology. • Next, the ecosystem of cloud-based SaaS applications has exploded thanks to cloud computing. • Finally, this SaaS ecosystem has helped power an even bigger boom of consumer-friendly mobile devices and apps that access SaaS. This Essential Guide examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access, and management of SaaS applications while reducing password sprawl. This guide will also review how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and additionally help evaluate the options available on the market.
Tags : 
saas, cloud computing, consumer-friendly, mobile devices, access to saas
    
Centrify Corporation
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
As mobile devices have pushed their way into the enterprise, they have brought cloud apps along with them. This app explosion means account passwords are multiplying, which exposes corporate data and leads to help desk calls from frustrated users. This paper will discover how IT can improve user productivity, gain visibility and control over SaaS and mobile apps, and stop password sprawl. Download this white paper to learn: * How you can leverage your existing AD to manage app access. * Key capabilities to consider when implementing Single Sign-On (SSO). * How SSO can boost IT satisfaction and improve security.
Tags : 
password sprawl, saas, single sign-on, it satisfaction, improve security
    
Centrify Corporation
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably will expectedly experience an increase in risk and a decline in productivity. This technology brief will explain why highly reliable SSO between your on-premise network and O365 is crucial, and why that implementation is surprisingly difficult to achieve using the accessory tools provided with O365. Learn the best-in-class approach that allows you to leverage your preexisting multiple-site Active Directory infrastructure to make SSO reliable and simple.
Tags : 
single sign-on, high availabiliy, office 365, user experience, productivity
    
Centrify Corporation
Webinar Published By: Lumension     Published Date: Sep 15, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection
    
Lumension
White Paper Published By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management
    
Arbor
White Paper Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks, application security, firewalls
    
Arbor
White Paper Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics, application security
    
Arbor
White Paper Published By: Arbor     Published Date: Sep 15, 2014
Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar
Tags : 
security analytics, it security, cyber defenses, application security, firewalls
    
Arbor
Case Study Published By: Sourcefire, LLC     Published Date: Sep 10, 2014
Maintaining a standard software configuration for all workstations across its organization has been a challenge for this large, multinational manufacturer, who runs each location as an independent unit. Recently, the company decided to launch a new security program to better protect its 16,000 workstations from malware infection. Since the existing endpoint protection software wasn’t offering enough information for security analysts to understand questionable events, as well as to distinguish routine activity from potential threats, the company’s security operations team chose to implement a new anti-malware solution. With the deployment of Sourcefire’s FireAMP, the company’s security analysts now have greater visibility into endpoint activity, and can quickly identify and contain suspicious events before workstations become infected. This has both increased employee productivity and has allowed the team to better protect critical corporate data.
Tags : 
cisco, sourcefire, network security, spot threats, fireamp
    
Sourcefire, LLC
Webinar Published By: HP     Published Date: Sep 08, 2014
Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect
Tags : 
servers, innovative, management, mobility, security
    
HP
Webinar Published By: AlienVault     Published Date: Sep 05, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data, security
    
AlienVault
Webinar Published By: AlienVault     Published Date: Sep 05, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security
    
AlienVault
Webinar Published By: AlienVault     Published Date: Sep 05, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management
    
AlienVault
White Paper Published By: Riverbed     Published Date: Sep 05, 2014
This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.
Tags : 
cloud, enterprise storage, data protection, it requirements, metrics
    
Riverbed
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.
Tags : 
sourcefire, network security, cisco, security report, cyber attack
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.
Tags : 
sourcefire, cisco, security report, cyber attack, malware
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.
Tags : 
securosis, sourcefire, cisco, endpoint protection, server protection
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
In this publication, we hope that you'll learn how to evolve your security strategy to overcome today's security challenges, take advantage of new business models, and gain more effective protections- anytime, all the time.
Tags : 
gartner, network security, sourcefire, cisco, security report
    
Sourcefire, LLC
Case Study Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
Making threat protection more intelligent and more accurate
Tags : 
network security, sourcefire, cisco, security report, cyber attack
    
Sourcefire, LLC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.