Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 176 - 200 of 914Sort Results By: Published Date | Title | Company Name
Case Study Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
Tags : 
security, security management, access control, identity management, iam
    
Borer Data Systems Ltd.
White Paper Published By: EMC     Published Date: Aug 03, 2015
See how XtremIO powers high-performance and high ROI for global application delivery for McCoy Global.
Tags : 
performance, roi, global application, network management, network performance
    
EMC
White Paper Published By: EMC     Published Date: Aug 03, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation
    
EMC
Case Study Published By: EMC     Published Date: Aug 04, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation
    
EMC
White Paper Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall
    
Imperva
White Paper Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security
    
Secunia
White Paper Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack
    
Palo Alto Networks
Case Study Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : 
utilities provider, cyberattack detection, vulnerability management, security management, it security
    
Vectra Networks
Webinar Published By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : 
eset, cybersecurity webinar, security manager, it security, anti spam
    
ESET, LLC.
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
This eBook looks at different threat sharing initiatives and alliances as well as explores how automating intelligence sharing will significantly accelerate detection and response times.
Tags : 
cyberthreat, cyberthreat intelligence, security, it solutions, cti companies
    
Logrhythm
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.
Tags : 
cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security
    
Kaspersky
White Paper Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet
    
ESET
White Paper Published By: F5     Published Date: May 12, 2016
This white paper illustrates the benefits of implementing F5.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
White Paper Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection
    
ESET
White Paper Published By: (ISC)²     Published Date: Oct 15, 2010
A four-step approach to establishing leading data protection practices.
Tags : 
isc2, data leak, protection planning, data protection, cloud computing
    
(ISC)²
White Paper Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers
    
IBM
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches
    
Trend Micro, Inc.
White Paper Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention
    
McAfee
White Paper Published By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : 
ibm, guardium, technology, data, security
    
IBM Corporation
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application, anti spam
    
Forcepoint
White Paper Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.
Tags : 
trendlabs, trend micro, data storage, small business, technology
    
Trend Micro Inc.
White Paper Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit
    
NetIQ
White Paper Published By: Symantec     Published Date: Jul 30, 2014
Knowledge is power: the Symantec guide to protecting your website.
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware
    
Symantec
White Paper Published By: Kaspersky     Published Date: Aug 27, 2015
Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.
Tags : 
kaspersky, attacks, cyberattacks, business process, security costs
    
Kaspersky
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management
    
DigitalPersona UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search