Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 351 - 375 of 706Sort Results By: Published Date | Title | Company Name
White Paper Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid
    
Websense
White Paper Published By: VeriSign     Published Date: Feb 10, 2011
This white paper will help you understand the threat from malware and how it can impact your online business.
Tags : 
verisign, malware security, data protection, anti spam, anti spyware
    
VeriSign
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
Don't let one of your customers become the next statistic. Give your customers an easy, safe and secure online banking experience.
Tags : 
safenet financial services, online banking, security, man-in-the-browser attacks, auditing
    
SafeNet
Free Offer Published By: GFI     Published Date: Sep 18, 2012
Decreasing budgets, an increasingly mobile workforce, limited staff, time constraints, a growing dependence on e-solutions - you face unique challenges as an IT professional. And you can't afford to disrupt your end users or clientele to implement security solution after security solution. That's where the IT Security Kit comes in. This handy kit provides everything you need to quickly and easily find the antivirus product that's manageable, reliable, cost-effective and just right for your organization.
Tags : 
technology, security, it security, antivirus, antispam
    
GFI
White Paper Published By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : 
allict, all ict, security management, security, network security
    
ALL ICT Ltd
White Paper Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott
    
ESET, LLC.
White Paper Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques
    
SPSS
White Paper Published By: McAfee     Published Date: Jan 28, 2014
Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.
Tags : 
gartner, endpoint protection, anti spam, anti spyware, anti virus
    
McAfee
White Paper Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, security
    
TriGeo Network Security
White Paper Published By: Symantec.cloud     Published Date: Mar 02, 2011
Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.
Tags : 
symantec.cloud, messagelabs, endpoint security, security threats, anti spam
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
anti spyware, anti virus, application security, security management
    
Symantec.cloud
White Paper Published By: IDFocus     Published Date: Aug 21, 2009
This whitepaper describes our unique approach and methodology for delivering an enterprise-wide Identity and Access Management solution. Our methodology, IDMology, offers pre-defined solutions to repeatable problems occurring during the lifecycle of an Identity Management project.
Tags : 
identity management, access management, iam, identity and access maangement, idmology
    
IDFocus
White Paper Published By: Cisco Systems     Published Date: Dec 23, 2013
In June 2013, Cisco engaged Miercom to evaluate the capabilities and performance of the latest Cisco Integrated Service Router (ISR) for branch offices—the Cisco 4451-X ISR. Review the report in full and discover why Miercom awarded the Cisco 4451-X ISR the Performance Verified award. Read Report
Tags : 
cisco, cisco waas, miercom, cisco integrated service router, isr
    
Cisco Systems
White Paper Published By: Tripwire     Published Date: Jun 30, 2009
Understand the compliance requirements of the European Union's Markets in Financial Instruments Directive (MiFiD), and how controlling IT change addresses many of those requirements.
Tags : 
tripwire, mifid, compliance, requirements, europe
    
Tripwire
White Paper Published By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : 
tripwire, breach, detection, security, configuration and change management
    
Tripwire
White Paper Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy
    
F5 Networks Inc
White Paper Published By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : 
penetration, test, pen, tracesecurity, risk
    
TraceSecurity
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast
    
HP - Enterprise
White Paper Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview
    
ArcSight
White Paper Published By: Distributed Management Systems     Published Date: Jul 03, 2011
White Paper describing a new approach to multi-factor authentication for the Cloud
Tags : 
mutual authentication for the cloud, authentication at application level, access control, application security, authentication
    
Distributed Management Systems
White Paper Published By: Dell     Published Date: Aug 16, 2013
"As any technology becomes increasingly popular and widespread, certain pieces of inaccurate information begin to sound like facts. Moreover, as a product matures, it evolves by taking on new features, shedding old ones and improving functionality. However, many products continue to carry those myths as truisms even as the version count rises higher. Get the facts about vSphere. Read the White Paper "
Tags : 
vsphere, virtual, technology, iscsi, storage virtualization
    
Dell
White Paper Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring
    
NetIQ
White Paper Published By: NetIQ     Published Date: Dec 23, 2010
This paper is broken into two main sections: a presentation and analysis of the survey results, and a discussion of why organizations must be able to manage, and administer Active Directory environments securely and successfully.
Tags : 
netiq, microsoft active directory management, security survey, active directory, security management
    
NetIQ
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak
    
Trend Micro, Inc.
White Paper Published By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : 
spyware, anti spyware, malware, vulnerability management, anti virus
    
8e6 Technologies
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      
Madison Logic