Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 326 - 350 of 799Sort Results By: Published Date | Title | Company Name
White Paper Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled
    
Ping Identity
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Todayís trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Todayís trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Todayís trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security
    
CA Technologies
White Paper Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management
    
IBM Software
White Paper Published By: IBM     Published Date: Jun 06, 2014
The following solution guide describes the ways that IBM Security offerings help organizations centrally manage and automate identity lifecycle management, access control and security analytics across the enterprise, from mainframe to workstation.
Tags : 
ibm, ibm security, access management, identity management, iam
    
IBM
White Paper Published By: IBM     Published Date: Nov 16, 2009
Is your information at risk? Read this whitepaper to find out how the IBM WebSphere MQ FTE solution, built on WebSphere MQ, offers reliable, secure and auditable file transfers.
Tags : 
ibm, ebf, websphere mq, file transfer edition, fte
    
IBM
White Paper Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att
    
AT&T
Case Study Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks
    
Arbor
White Paper Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
Tags : 
locklizard, data leakage, information leakage, secure information, security
    
LockLizard
White Paper Published By: Dell SecureWorks     Published Date: Apr 11, 2011
Read this whitepaper to understand how Dell SecureWorks can help your midsize organization improve security, increase operational efficiency and demonstrate compliance with regulatory requirements, allowing you to focus on the priorities and strategic projects that drive your business.
Tags : 
dell secureworks, internet security, compliance, regulatory compliance, vulnerability
    
Dell SecureWorks
White Paper Published By: Lumension     Published Date: Jun 10, 2011
Government agencies must protect sensitive data while improving transparency and accessibility-all in the face of rising cyberthreats. Download this free whitepaper to learn how.
Tags : 
malware, endpoint security, cyberattack, hacker, government security
    
Lumension
White Paper Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download the ESG white paper to help you identify: -Why virtualization should scare you -Security you didn't know existed -How to be confident in the cloud
Tags : 
trend micro, information security, virtualization, cloud, internet content security
    
Trend Micro Inc.
White Paper Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
White Paper Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control
    
IBM
White Paper Published By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : 
ip networks, ip network, ip fax, ip faxing, faxing
    
GFI
Webinar Published By: McAfee     Published Date: Feb 06, 2013
Insight and control to secure your dynamic cloud environment at every infrastructure layer
Tags : 
cloud security, cloud computing, public cloud security, private cloud security, cloud security policy enforcement
    
McAfee
White Paper Published By: Lumension     Published Date: Mar 29, 2011
Download this Lumension white paper from Web Buyer's Guide to learn more about a new intelligent approach to application whitelisting.
Tags : 
lumension, whitelisting, business intelligence, deployment, malware
    
Lumension
White Paper Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system
    
Nemx Software Corporation
Case Study Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact
    
Nuance Communications
White Paper Published By: Iovation     Published Date: Sep 25, 2009
Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.
Tags : 
cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks
    
Iovation
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This yearís ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantecís security experts.
Tags : 
internet security, istr, cybercrime, internet security trends, anti spam
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 15, 2014
This yearís ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantecís security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats
    
Trend Micro SaaS
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search