Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 201 - 225 of 709Sort Results By: Published Date | Title | Company Name
White Paper Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services
    
Actimize
White Paper Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy
    
Absolute Software
White Paper Published By: TrendMicro     Published Date: May 09, 2011
The test doesn't just score how well a product can detect file-based threats (Infection Layer), but includes the ability to block the threat at its source (Exposure Layer) and detect/block the threat during execution (Dynamic Layer). Click here to see the results.
Tags : 
trendmicro, endpoint security, benchmark testing, av-test.org, internet security
    
TrendMicro
White Paper Published By: Symantec     Published Date: Jan 31, 2013
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : 
endpoint protection, security, best practices, survey, anti spam
    
Symantec
White Paper Published By: Trend Micro     Published Date: Oct 12, 2012
See which security solution is the fastest and most efficient in this FREE analysis
Tags : 
ation security, information technology, trend micro, security, auditing
    
Trend Micro
White Paper Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends
    
ESET
White Paper Published By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : 
eset, endpoint security, networkwide platform, integrated security management, heuristic scanning
    
ESET
White Paper Published By: IBM     Published Date: Sep 18, 2008
It’s a changing climate for network security and demands for improved documentation of regulatory compliance continue to increase. The time has come for a comprehensive, cost-effective, scalable security event and log management solution. Read this white paper for more information about the IBM solution that answers this challenge.
Tags : 
ibm, ibm, mmdg, security management, security data management
    
IBM
White Paper Published By: Entrust     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard
    
Entrust
White Paper Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing
    
Nativeflow
White Paper Published By: Brainloop     Published Date: Nov 09, 2011
This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.
Tags : 
brainloop, enterprise, information management, security options, technology
    
Brainloop
White Paper Published By: Brainloop     Published Date: Jan 04, 2012
How can IT provide a way for users to share documents without putting the company at risk? This white paper explores collaboration solutions using your current content management, ERP and security infrastructure, as well as a few new ones that might not be on your radar.
Tags : 
brainloop, technology, security, security solutions, infrastructure
    
Brainloop
White Paper Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile
    
Pointsec
White Paper Published By: Iovation     Published Date: Sep 25, 2009
One of the leading and fastest growing suppliers of systems for online betting, casino, poker and bingo uses iovation to combat online fraud and abuse.
Tags : 
online betting, casino, poker and bingo, combat online fraud and abuse, fraud solution
    
Iovation
White Paper Published By: ESET     Published Date: Jan 08, 2010
This report provides a report of the Top Computer Threats in the United Kingdom.
Tags : 
eset, monthly threat report, top computer threat, security, anti spam
    
ESET
White Paper Published By: NetApp     Published Date: Apr 27, 2010
Close collaboration between NetApp, Cisco, and VMware has resulted in the industry's first secure multi-tenancy solution to partition shared IT infrastructure which delivers performance, availability, and responsiveness, while maintaining cost efficiencies. Download this exclusive report from analyst ESG to learn more.
Tags : 
netapp, esg report, it infrastructure, secure multi-tenancy, security
    
NetApp
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This report details the current state of the security management market and what to expect moving forward.
Tags : 
security, testing, security controls, security management, tools
    
HP - Enterprise
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching
    
McAfee
White Paper Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : 
ssl, ssl technology, verisign, trust, seal
    
VeriSign Incorp.
White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.
Tags : 
messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard
    
Symantec.cloud
White Paper Published By: RM Global     Published Date: Feb 22, 2011
A new raised floor panel category for high security data centers and SCIF requiring real-time preemptive under floor security monitoring.
Tags : 
data center, raised floor, data center security, scif, computer room
    
RM Global
White Paper Published By: Brocade     Published Date: Sep 07, 2010
There is a significant problem with cloud offerings, namely that they present new challenges to IT managers, both in general security within their own enterprises and in assessing the risk profiles inherent in each cloud offering they might source.
Tags : 
brocade, cloud computing, security, computerworld uk, internet security
    
Brocade
White Paper Published By: IBM Corp     Published Date: Sep 23, 2011
This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.
Tags : 
ibm, smb, backup, technology, data recovery
    
IBM Corp
White Paper Published By: ArcSight     Published Date: Mar 04, 2009
This whitepaper will outline the drivers for log management as well as their underlying challenges and drive towards a common set of requirements for evaluation of log management tools.
Tags : 
log management, logs, siem, arcsight logger, event logs
    
ArcSight
White Paper Published By: Software Security Solutions     Published Date: Jun 28, 2010
Ready to change Antivirus Software? Read this comparison white paper first!
Tags : 
software security, endpoint security, antivirus software, malware, anti spam
    
Software Security Solutions
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      
Madison Logic