Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 151 - 175 of 884Sort Results By: Published Date | Title | Company Name
White Paper Published By: Okta     Published Date: Oct 01, 2010
Controlling who is granted secure access to which applications and data becomes a real challenge when users can get access from any browser, at any time, from any place.
Tags : 
okta, cloud area network, scaling saas applications, security, identity management
    
Okta
White Paper Published By: VMware, Inc.     Published Date: Jul 09, 2015
This paper talks about the benefits and chance that come with cloud computing in a federal agency level.
Tags : 
cloud computing, cloud solutions, cloud collaboration, opdivs, hhs
    
VMware, Inc.
White Paper Published By: Acquia     Published Date: Apr 16, 2015
Can you build an invincible Drupal site? The easy answer is no, but you have a few ways to prepare and secure your site to withstand any sort of vulnerability or traffic spike.
Tags : 
cloud security, security management, drupal site, protection, security
    
Acquia
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud
    
DigitalPersona UK
White Paper Published By: Trend Micro SPN     Published Date: Nov 24, 2009
A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus
    
Trend Micro SPN
Webinar Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks, access control, anti spam
    
Lumension
White Paper Published By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : 
intelligence technology, security management, threat intelligence, intelligence protection, security solutions
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data
    
IBM
White Paper Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring, access control, anti spyware
    
McAfee
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Tags : 
watchguard technologies, unified threat management, utm, network humming, security
    
WatchGuard Technologies
Case Study Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware
    
Websense
White Paper Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business.
Tags : 
disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp
    
Macquarie Telecom
White Paper Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop
    
Sybase
White Paper Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance
    
Secure Computing
White Paper Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring
    
McAfee
White Paper Published By: PKWARE     Published Date: Aug 21, 2009
Regulatory and business requirements are driving the need for protecting information stored and transferred electronically. PKWARE provides an introduction to protecting your most valuable asset - your data.
Tags : 
regulatory compliance, compliance, information management, data security, data protection
    
PKWARE
White Paper Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents
    
Intralinks
White Paper Published By: Tricentis     Published Date: Jun 22, 2015
This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.
Tags : 
testing, tosca testsuit, test, sap, test portfolios
    
Tricentis
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Learn how McAfee Network Security Platform helps you realize greater consolidation benefits while minimizing project costs and disruption to your production environment.
Tags : 
network security, network consolidation, consolidation capabilities, anti spam, anti spyware
    
McAfee
White Paper Published By: IBM     Published Date: Jul 31, 2015
Security management for mainframe clouds.
Tags : 
application security, compliance, internet security, security management
    
IBM
Case Study Published By: Puppet Labs     Published Date: Apr 05, 2011
Puppet enabled Constant Contact to transition away from its legacy deployment infrastructure and adopt DevOps practices that increased productivity and efficiency.
Tags : 
puppetlabs, puppet labs, email, online marketing tool, legacy deployment infrastructure
    
Puppet Labs
White Paper Published By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : 
quocirca, content security, aep networks, clearswift, symantec
    
Quocirca
White Paper Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security
    
CA Technologies
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring
    
McAfee
White Paper Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management
    
Avalere
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search