Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3881Sort Results By: Published Date | Title | Company Name
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : 
phishing, next-generation malware, security, email, it management
    
ThreatTrack Security
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management
    
ThreatTrack Security
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : 
advanced protection, cyberthreat, security, incident response team, threatsecure
    
ThreatTrack Security
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this white paper to learn how to add value through malware analysis.
Tags : 
malware, security threat, cyberattack, cyberthreat, malware analysis
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : 
security challenges, mid-market security, cyber-extortion, cyberthreat, security
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : 
persistent threats, cyberattacks, security, data breach, it management
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : 
targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
This presentation will look at the various motivations of attackers, explore why they dont matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.
Tags : 
threattrack, cyber security, attacks, protection, security
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: Advanced threats and their potential points of entry Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity, it management
    
ThreatTrack Security
Webinar Published By: Pluralsight     Published Date: May 18, 2015
Arm your developer team with the information presented in our free course: Web Security and the OWASP Top 10: The Big Picture. In this course, Microsoft MVP and security guru Troy Hunt tells you the necessary steps to take to protect your organization. -Top 10 security risks -Security misconfiguration -Sensitive data exposure -Broken authentication and session management
Tags : 
web security, security, data, xss, scripting
    
Pluralsight
White Paper Published By: Seagate Technology     Published Date: May 15, 2015
An inside look at how IT Executives and System Integrators are managing video surveillance data.
Tags : 
system integrators, enterprise it, video surveillance, knowledge management, ip networks
    
Seagate Technology
White Paper Published By: Seagate Technology     Published Date: May 15, 2015
This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industrys first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.
Tags : 
multi level security, big data, hpc scale, hpc, high performance comptuting
    
Seagate Technology
White Paper Published By: Aerohive     Published Date: May 14, 2015
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security
    
Aerohive
White Paper Published By: Cisco     Published Date: May 14, 2015
The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
hacker detection, intrusion detection, security management, security policies, web service security
    
Cisco
White Paper Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp
    
Kaseya
White Paper Published By: Kaseya     Published Date: May 13, 2015
TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.
Tags : 
kaseya, hybrid, cloud, management, msp
    
Kaseya
White Paper Published By: Aerohive     Published Date: May 13, 2015
This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.
Tags : 
wi-fi, mobility, security, mobile security, byod
    
Aerohive
White Paper Published By: Tenable Network Security     Published Date: May 12, 2015
Download and read author Steve Piper's concise, yet detailed new eBook, Definitive Guide to Continuous Network Monitoring, to learn: -Why there is a growing interest in continuous network monitoring -How continuous network monitoring works, and -Whats required to implement continuous network monitoring
Tags : 
continuous network monitoring, security state, compliance, contextual analytics, vulnerability management
    
Tenable Network Security
White Paper Published By: IBM     Published Date: May 12, 2015
whitepaper describing how Universal document and image viewers can reduce costs, time and headaches.
Tags : 
ibm, big data, information lifecycle, email, document sharing
    
IBM
White Paper Published By: Kaspersky     Published Date: May 11, 2015
Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isnt enough.
Tags : 
kaspersky, cybersecurity, mitigation, online attacks, cyberattack
    
Kaspersky
White Paper Published By: Box     Published Date: May 11, 2015
This white paper focuses on four considerations for a mature mobile strategy to reduce the risk of falling behind other key competitors.
Tags : 
mature mobile strategy, mobile devices, workflow, security, secure collaboration
    
Box
White Paper Published By: Box     Published Date: May 11, 2015
This paper reveals the 6 essential elements of a mobile strategy.
Tags : 
mobility, modern mobility strategy, mobility strategy, box, mobile
    
Box
White Paper Published By: Nexsan by Imation     Published Date: May 11, 2015
Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.
Tags : 
imation, nexsan, physical security, camera, surveillence
    
Nexsan by Imation
White Paper Published By: Box     Published Date: May 11, 2015
This paper provides information on mobile content management and evaluates 19 major MCM providers.
Tags : 
mobile content management, mcm, mcm providers, mobility, content management
    
Box
White Paper Published By: Box     Published Date: May 11, 2015
This infographic provides information on how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective.
Tags : 
mobile, mobility, mobile content management, apply mobile to core processes, share content
    
Box
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.