Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 326 - 350 of 920Sort Results By: Published Date | Title | Company Name
White Paper Published By: Arbor     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas
    
Arbor
Free Offer Published By: Symantec     Published Date: Jan 31, 2013
Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : 
endpoint protection, security, overview, access control, anti spam
    
Symantec
Free Offer Published By: McAfee     Published Date: Jan 23, 2013
DLP solutions must move beyond simple keyword matching and regular expressions. Learn how Gartner evaluates DLP providers and why McAfee is again a leader in the 2013 Gartner MQ for Content-Aware DLP.
Tags : 
dlp, data loss prevention, content-aware dlp, context-aware dlp, disaster recovery
    
McAfee
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
High-security mobility management is a subset of the enterprise mobility management market that serves organizations with the most-stringent requirements. If security is the highest priority, IT planners should pursue best-of-breed solutions for each platform they intend to support.
Tags : 
citrix, gartner, mdm, emm, intrusion prevention
    
Citrix Systems, Inc.
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
White Paper Published By: IBM     Published Date: Sep 18, 2008
Organizations of all sizes need security that can adapt to their ever-changing environments. IBM Managed Security Services can help you integrate security with business processes for increased flexibility, efficiency and productivity. Read this white paper to learn how IBM can put you in the driver’s seat with protection on demand.
Tags : 
ibm, ibm mmdg, managed security, productivity, security
    
IBM
White Paper Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data
    
IBM
White Paper Published By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : 
network security, nac, network access control, access control, endpoint security
    
Mirage Networks
White Paper Published By: Adobe     Published Date: Apr 13, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, cloud services, it research, global insights
    
Adobe
White Paper Published By: ESET, LLC.     Published Date: May 16, 2011
Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.
Tags : 
eset, global threat report, april 2011, 419, scam
    
ESET, LLC.
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
White Paper Published By: Qualys     Published Date: Jul 20, 2012
Vulnerabilities are very common nowadays. Even being a safest network does not mean that it cannot be compromised. It's how you handle these vulnerability and flaws and rectify the issues. In order help the security engineers Qualys, Inc. pioneer security brings free guide on Top 10 reports for Managing Vulnerability. This paper cuts through the data overload generated by some vulnerability detection solutions.
Tags : 
technology, security, vulnerabilities, internet, virus
    
Qualys
Case Study Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn
    
Astaro
White Paper Published By: Tripwire, Inc     Published Date: Mar 10, 2010
Make compliance just another part of your processes by taking an operational approach to security
Tags : 
tripwire, compliance, security, business continuity, security management
    
Tripwire, Inc
White Paper Published By: Tripwire     Published Date: Apr 21, 2010
Make compliance just another part of your processes by taking an operational approach to security.
Tags : 
tripwire, compliance, security, business continuity, security management
    
Tripwire
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management
    
Intel Security
White Paper Published By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : 
cyberattacks, security, cybercriminals, security application, access control
    
Venafi
White Paper Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Provide site visitors visual cues that indicate your site is legitimate with Extended Validation (EV) SSL available from VeriSign.  Read this paper to learn how to increase site visitor confidence in your site. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl
    
VeriSign Incorp.
White Paper Published By: Tripwire     Published Date: Jun 30, 2009
Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.
Tags : 
tripwire, hipaa, security, provision, network
    
Tripwire
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of todayís cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions
    
IBM
White Paper Published By: IBM     Published Date: Jun 26, 2013
An Economist Intelligence Unit research program commissioned by IBM.
Tags : 
holistic, risk management, business continuity planner, compliance, security management
    
IBM
White Paper Published By: IBM     Published Date: Jan 23, 2013
Global organizations are increasingly emphasizing business resilience, that is, the ability to adapt rapidly to a continuously changing business environment.
Tags : 
risk management, disaster recovery, business continuity, security, email security
    
IBM
White Paper Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention
    
Venafi
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution
Tags : 
banca intesa, threats, hp arcsight, cyber attacks, arcsight
    
HP - Enterprise
Webinar Published By: Bit9     Published Date: Oct 01, 2012
In this on-demand webcast, learn how to transition your PCI Compliance initiative into an adaptive, proactive security project. Join Chris Strand, QSA and Bit9 Solution Engineer, to learn how you can go Beyond PCI Compliance to Advanced Threat Protection.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search