Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Internet Security

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Internet Security

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 351 - 375 of 745Sort Results By: Published Date | Title | Company Name
White Paper Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection
    
LifeLock
White Paper Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Tags : 
cloud, video conference, protection, security, management
    
LifeSize, a division of Logitech
White Paper Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : 
likewise, linux, unix, (sso), kerberos
    
Likewise Software
White Paper Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing, security
    
LockLizard
White Paper Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
Tags : 
locklizard, data leakage, information leakage, secure information, security
    
LockLizard
White Paper Published By: Logicalis     Published Date: Mar 07, 2014
Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.
Tags : 
logicallis, iaas, security, compliance, cloud
    
Logicalis
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
This guide focuses solely on SIEM solutions that are available as appliances that include both the hardware and software needed to deploy them.
Tags : 
security, application security, siem, siem solutions, identity management
    
Logrhythm
White Paper Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor
    
LogRhythm
Webinar Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, Iíll look at everything thatís new as far as security in Windows 8, with a special focus on mobility.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms Ė and quantifies Ė the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you canít leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks, access control, anti spam
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : 
hipaaa, hitech act, compliance, cyber liability, healthcare data
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.
Tags : 
security, network security, network protection, data security, data protection
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
Learn the recommended steps to cure your patch management headache as we dive into a technical discussion of what the critical items to address.
Tags : 
patch, best practices, networking, risk mitigation, network security
    
Lumension
White Paper Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com≠plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security
    
Lumension
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall
    
McAfee
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search