Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 151 - 175 of 706Sort Results By: Published Date | Title | Company Name
White Paper Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention
    
McAfee
White Paper Published By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : 
ibm, guardium, technology, data, security
    
IBM Corporation
White Paper Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.
Tags : 
trendlabs, trend micro, data storage, small business, technology
    
Trend Micro Inc.
White Paper Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit
    
NetIQ
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management
    
DigitalPersona UK
White Paper Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.
Tags : 
dos, ddos, attacks, threats, layered security
    
McAfee
White Paper Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business, access control
    
CA Technologies
White Paper Published By: Mimecast     Published Date: Oct 17, 2013
"Storage Anywhere & Everywhere" is a new study by Free Form Dynamics sponsored by Mimecast. It includes lessons from expert or 'elite' organizations on how to get control of your data and make it work to your advantage.
Tags : 
mimecast, free form dynamics, inforgraphic, defragmentation, liberating data
    
Mimecast
White Paper Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security
    
DataMotion
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security
    
Absolute Software
White Paper Published By: Symantec     Published Date: Jan 31, 2013
Read this comparison test to find out which antivirus Protection product is right for you.
Tags : 
antivirus, endpoint, protection, security, test
    
Symantec
White Paper Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues whilst enabling you to calculate the number of GFI EventsManager instances required on your network.
Tags : 
event manager, events manager, events management, log management, security event
    
GFI
White Paper Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems
    
ArcSight
Webinar Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management, compliance
    
Lumension
Webinar Published By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : 
security, application security, java, vulnerabilities, developer
    
HP - Enterprise
White Paper Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem
    
ArcSight
Webinar Published By: NetApp and VMware     Published Date: Jan 09, 2012
Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.
Tags : 
netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility
    
NetApp and VMware
White Paper Published By: Double-Take Software     Published Date: Sep 24, 2009
Download this free whitepaper to learn how combining Double-Take Software's replication solutions with virtualization technologies, organizations can achieve additional flexibility and cost-effectively protect their critical data and applications.
Tags : 
disaster recovery, recoverability, virtualization, double-take, lost data
    
Double-Take Software
White Paper Published By: Vision Solutions     Published Date: Sep 24, 2009
Download this free white paper to learn how combining Double-Take Software's replication solutions with virtualization technologies, organizations can achieve additional flexibility and cost-effectively protect their critical data and applications.
Tags : 
disaster recovery, recoverability, virtualization, double-take, lost data
    
Vision Solutions
White Paper Published By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications
    
Qualys
White Paper Published By: F5 Networks Inc     Published Date: Feb 25, 2010
Learn how Domain Name System Security Extensions (DNSSEC) can add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole.
Tags : 
dnssec, dns cache poisoning, domain name system security extensions, encryption, deployment
    
F5 Networks Inc
White Paper Published By: LockLizard     Published Date: Dec 08, 2008
This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Tags : 
locklizard, document security, encryption, copy protection, digital rights management
    
LockLizard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Madison Logic