Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3152Sort Results By: Published Date | Title | Company Name
White Paper Published By: Kaspersky     Published Date: Jul 29, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage.
Tags : 
protect, advanced threats, cyberattacks, sensitive information, financial profit
    
Kaspersky
White Paper Published By: Global Knowledge     Published Date: Jul 29, 2014
This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.
Tags : 
global knowledge, ibm, tivoli, monitor, infrastructure
    
Global Knowledge
White Paper Published By: Global Knowledge     Published Date: Jul 29, 2014
There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.
Tags : 
global knowledge, vcenter, server, esxi, host
    
Global Knowledge
White Paper Published By: Global Knowledge     Published Date: Jul 29, 2014
Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We will review these concerns and discuss how the industry dealt with them, and then explore how these same concerns can be mitigated with a proper cloud strategy.
Tags : 
global knowledge, iaas, public clouds, cloud, security
    
Global Knowledge
White Paper Published By: HP     Published Date: Jul 28, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing
    
HP
White Paper Published By: Barracuda     Published Date: Jul 25, 2014
This research paper by Info-Tech evaluates 10 competitors in the NGFW market to help you choose the right vendor and products for your enterprise needs.
Tags : 
ngfw, next generation firewall, evaluation of security providers, security vendor comparison, security
    
Barracuda
White Paper Published By: CBeyond     Published Date: Jul 22, 2014
This guide was created to offer a preliminary understanding of Cloud computing, so that business owners and managers will be better positioned to make the move toward Cloud services sooner, rather than later.
Tags : 
cbeyond, cloud computing, cloud applications, cloud security, virtual applications
    
CBeyond
White Paper Published By: Entrust     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Todays enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.
Tags : 
identity guard, cloud services, trust foundation, communication, transactions
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Todays enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
As various types of digital certificates are introduced to an organization, they become more difficult to track and manage particularly if theyre issued from different certification authorities.
Tags : 
identity guard, cloud service, certificate discovery, management solution, security
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.
Tags : 
identity guard, cloud services, secure, mobile devices, business efficiency
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).
Tags : 
identity guard, cloud services, pki, secure, mobile identities
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
device certificates, identity, authentication, mobile world, information technology
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
To help protect access to this sensitive information, a strict set of security controls is defined in the FBIs CJIS Security Policy and must be adhered to by organizations that access CJIS information.
Tags : 
authentication, cjis, compliance, sensitive information, security
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.
Tags : 
solution, infrastructure protection, avoid non-compliance, cyberattack, security
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations.
Tags : 
authentication, healthcare, medicine, identity, security
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users sometimes in many different locations can be time-consuming and costly.
Tags : 
identity guard, cloud service, ssl, management, digital certification
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industrys most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : 
ssl, digital certifications, discovery, management, solutions
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
Within the enterprise realm, two-factor authentication has become more than just an option its now an indispensable asset.
Tags : 
mapping, two-factor authentication, indispensable asset, cybersphere, identities
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach.
Tags : 
history, malware, cybercrime, global, attacks
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.
Tags : 
cjis, compliance solutions, security control, law enforcement, courts
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions and overall trust erodes.
Tags : 
defending, enterprise, data security, protection, private identity
    
Entrust
White Paper Published By: Entrust     Published Date: Jul 21, 2014
How can this growing acceptance of the mobile platform across geographies, verticals, cultures and even age groups be leveraged and extended to secure traditional digital identities in both the physical and online spaces?
Tags : 
mobile, digital identity, platform, geographies, verticals
    
Entrust
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.