Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3620Sort Results By: Published Date | Title | Company Name
White Paper Published By: Riverbed     Published Date: Feb 26, 2015
In order to be successful today, operations teams require complete application-level visibility across the entire environment.
Tags : 
customer relationship management, security, human resources, sales force automation, application integration
    
Riverbed
White Paper Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : 
pci compliance, auditing, data security, cardholder data, security standards
    
Riverbed
White Paper Published By: Riverbed     Published Date: Feb 26, 2015
To build modern applications, developers could use some help. That is where application performance management (APM) solutions come in. This whitepaper will provide you 10 ways developers can use APM to improve the quality and performance of their software.
Tags : 
modern applications, developers, application performance management, apm, software quality
    
Riverbed
White Paper Published By: Riverbed     Published Date: Feb 26, 2015
While powerful and beneficial, the Citrix XenApp environment can present new challenges to IT departments when troubleshooting application performance issues. Citrix acts as a proxy for backend applications, making it difficult to get end-toend visibility of transactions and to identify and troubleshoot end-user experience problems
Tags : 
troubleshooting, application performance issues, application management, enterprise application, application virtualization technology
    
Riverbed
White Paper Published By: IBM     Published Date: Feb 24, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : 
ibm, data discovery, data classification, big data, risk mitigation
    
IBM
White Paper Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions
    
Okta
Webinar Published By: CDW     Published Date: Feb 24, 2015
Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.
Tags : 
software asset management, network security, licensing, cloud-based apps, licensing security
    
CDW
White Paper Published By: CDW     Published Date: Feb 24, 2015
Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.
Tags : 
software piracy, software vendors, audit, software licenses, software compliance
    
CDW
White Paper Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation
    
Okta
White Paper Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility
    
Okta
White Paper Published By: Okta     Published Date: Feb 24, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
identity and mobility management, office 365, cloud, maximum user adoption, identity management
    
Okta
White Paper Published By: CDW     Published Date: Feb 24, 2015
All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.
Tags : 
sam, software asset management, strategic enterprise assets, license utilization, cloud based computing
    
CDW
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
Intel Security
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management
    
Intel Security
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.
Tags : 
gartner, magic quadrant, security connected framework, big security data, big data
    
Intel Security
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.
Tags : 
security information, security connected framework, big security data, big data, log management
    
Intel Security
White Paper Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring
    
BitSight Technologies
White Paper Published By: Docusign     Published Date: Feb 19, 2015
La société américaine DocuSign, spécialiste des outils de signature électronique, permet des signatures numériques conformes aux normes de l'Union Européenne et va permettre à un plus grand nombre d’entreprises d’accéder plus vite aux avantages d’une activité 100% numérique avec des transactions dans le cloud rapides et sécurisées.
Tags : 
docusign sécurise, signature électronique, security
    
Docusign
White Paper Published By: Docusign     Published Date: Feb 19, 2015
À cause du nombre croissant de professionnels qui utilisent les téléphones et applications mobiles, la « vague mobile » a des incidences sur chaque fonction commerciale dans le monde entier et modifie la manière de faire des affaires. Les technologies telles que les signatures électroniques mobiles peuvent aider les entreprises à finaliser leurs transactions commerciales. Les signatures électroniques mobiles vous permettent, ainsi qu'à vos contacts, d'envoyer et de signer des documents légalement, grâce aux téléphones et à d'autres appareils mobiles, à tout moment et en tout lieu.
Tags : 
docusign, la signature electronique, compliance
    
Docusign
Case Study Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Feb 18, 2015
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. Read this whitepaper to learn how your organization can properly embrace a higher security posture to protect SSL.
Tags : 
ssl, cryptographic protocols, data security, higher security posture, security
    
F5 Networks Inc
White Paper Published By: Docusign     Published Date: Feb 18, 2015
This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.
Tags : 
wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology
    
Docusign
White Paper Published By: Docusign     Published Date: Feb 18, 2015
This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.
Tags : 
esignature technologies, mcafee, salesforce, linkedin, esignature solutions
    
Docusign
White Paper Published By: Docusign     Published Date: Feb 18, 2015
This White Paper reveals the EU e-signature law and the benefits of knowing about this law for the business.
Tags : 
esignature law, electronic signature technology laws, eu esignature law, docusign, identifying the signer
    
Docusign
White Paper Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.