Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3070Sort Results By: Published Date | Title | Company Name
White Paper Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards
    
Skillsoft
White Paper Published By: CBeyond     Published Date: Jul 22, 2014
This guide was created to offer a preliminary understanding of Cloud computing, so that business owners and managers will be better positioned to make the move toward Cloud services sooner, rather than later.
Tags : 
cbeyond, cloud computing, cloud applications, cloud security, virtual applications
    
CBeyond
White Paper Published By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange. In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
alienvault, alienvault usm, security operations center, smb, javvad malik
    
AlienVault
Webinar Published By: Neustar     Published Date: Jul 14, 2014
More and more criminals are using DDoS attacks as a distraction or smokescreen for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this underground economy of the Internet really looks like a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more
Tags : 
neustar, ddos, cybercrimes, malware, botnets
    
Neustar
White Paper Published By: Neustar     Published Date: Jul 14, 2014
For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
Tags : 
neustar, blackbeard, pirate, siteprotect, cloud computing
    
Neustar
White Paper Published By: Neustar     Published Date: Jul 14, 2014
Its no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyones a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, toowhether you use Neustar, another provider or your in-house team to manage your external DNS.
Tags : 
neustar, ddos, ecommerce, protection, security
    
Neustar
White Paper Published By: Neustar     Published Date: Jul 14, 2014
DDoS attacks against high-tech firms have started to take a dangerous turn. Its called DDoS smokescreening attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustars 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
Tags : 
neustar, ddos, online gaming, ecommerce, protection
    
Neustar
Webinar Published By: AlienVault     Published Date: Jul 14, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data, security
    
AlienVault
Webinar Published By: AlienVault     Published Date: Jul 14, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security
    
AlienVault
Webinar Published By: AlienVault     Published Date: Jul 14, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management
    
AlienVault
Webinar Published By: Symantec Corporation     Published Date: Jul 11, 2014
View the SSL 101 video and discover how Symantec SSL Certificates help you protect your business and your customers confidential information from attack.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
Webinar Published By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
Webinar Published By: Symantec Corporation     Published Date: Jul 11, 2014
Learn why the worlds largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
Webinar Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec extends SSL solutions with comprehensive website security solutions that enables companies to protect and grow their businesses by showing their customers that their trusted website is safe to search, surf and buy.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
Webinar Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
Webinar Published By: Symantec Corporation     Published Date: Jul 11, 2014
Increase your website security with Extended Validation SSL certificates and find out how that translates to increased revenue for your business.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
Webinar Published By: Symantec Corporation     Published Date: Jul 11, 2014
Online shopping shouldnt have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks youll be on your way to browsing and buying in safety.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: VSS Monitoring     Published Date: Jul 09, 2014
A full-service personal bank has provided award winning financial services to its customers for over fifty years. As one of the oldest independently owned and managed banks in the region, it takes great pride in offering superior customer service and support. Its networks support daily operations for over 19 local offices and hundreds of thousands of customer accounts. Download to learn more!
Tags : 
vss monitoring, financial services provider, security, roi, banking
    
VSS Monitoring
White Paper Published By: VSS Monitoring     Published Date: Jul 09, 2014
In an environment where a millisecond can cost a million dollars, the monitoring infrastructure must capture 100 percent of the traffic, regardless of its characteristics. The world of high-frequency trading (HFT) and algorithmic trading places high demands on the network infrastructure with no tolerance for packet latency or loss. Download to learn more!
Tags : 
vss monitoring, network monitoring, security, threats, cyber terrorists
    
VSS Monitoring
White Paper Published By: Websense     Published Date: Jul 08, 2014
This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.
Tags : 
websense, wsga, web security, testing of web security, web security products compared
    
Websense
White Paper Published By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : 
detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware
    
Websense
White Paper Published By: Websense     Published Date: Jul 08, 2014
This paper provides 5 essentials for protecting against advanced persistent threats (APTS)
Tags : 
apts, understanding apts, apt security strategy, anti spam, anti spyware
    
Websense
White Paper Published By: Websense     Published Date: Jul 08, 2014
A white paper on the shortest path to prevention and risk production.
Tags : 
protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware
    
Websense
White Paper Published By: HP     Published Date: Jul 03, 2014
A Viewpoint paper on how managed cloud-based options balance control with flexibility and scale.
Tags : 
enterprise mobility, security and governance, cloud-based mobility services, web service security, mobile computing
    
HP
White Paper Published By: Network Instruments     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci
    
Network Instruments
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.