Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 226 - 250 of 722Sort Results By: Published Date | Title | Company Name
White Paper Published By: Google Apps     Published Date: Nov 23, 2010
This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security.
Tags : 
google apps, messaging, collaboration, information security, cloud computing system
    
Google Apps
White Paper Published By: Google Apps     Published Date: Nov 23, 2010
This white paper, sponsored by Google, discusses the critical and growing requirements for better email security and email archiving, and it illustrates the benefits of the cloud approach to manage both.
Tags : 
google apps, cloud-based security, archiving, cloud computing, e-discovery
    
Google Apps
White Paper Published By: GoToAssist     Published Date: Oct 05, 2011
It used to be that having your head in the clouds was pejorative. Not anymore. Today, almost everyone wants to be in the cloud. But skepticism about cloud security is leaving a few folks stuck on the ground. This white paper explores key cloud security questions addressed during the 2010 Forrester Security Forum, including private versus public clouds, security standards and cloud services trends.
Tags : 
citrix, technology, cloud computing, data protection, security
    
GoToAssist
White Paper Published By: Guardian Digital     Published Date: Oct 02, 2007
Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.
Tags : 
open source, open source security, network security, adaptability, security management
    
Guardian Digital
White Paper Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management
    
Guardian Digital
White Paper Published By: hightail     Published Date: Jan 17, 2014
Learn 6 tips and tricks that can help you better organize and utilize your email in order to increase productivity and improve your workflow.
Tags : 
knowledge management, enterprise applications, security management, email archiving, cloud computing
    
hightail
White Paper Published By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
data management, security management, mobile computing, mobile data systems, application integration
    
hightail
White Paper Published By: Hosting.com     Published Date: Jan 21, 2011
This white paper demonstrates how companies that have moved their SQL databases to the cloud have overcome past performance and security concerns to increase operational efficiency, improve availability and scalability, reduce costs, gain a faster-time to-market, and achieve a better return on investment.
Tags : 
hosting.com, sql database, cloud computing, virtualization, data-intensive application
    
Hosting.com
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution
Tags : 
banca intesa, threats, hp arcsight, cyber attacks, arcsight
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn about the three biggest threats to mobile applications and the recommendations on how to mitigate the risk from mobile computing security vulnerabilities
Tags : 
mobile application threats, mobile application, mobile, risk, api
    
HP - Enterprise
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Kuoni Travel teamed up with HP and used their TippingPoint to help customers handle threat landscape effectively, protecting both agents and customers
Tags : 
kuoni travel, hp tippingpoint, threat landscape, threats, travel
    
HP - Enterprise
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Novagalicia Banco secured critical applications with HP Fortify improving the security of the discrete applications that were coming from myriad sources
Tags : 
novagalicia, applications, hp fortify, financial service industry, saas
    
HP - Enterprise
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment
Tags : 
obrela, hp arcsight, siem, security information, event management solution
    
HP - Enterprise
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how the CIO of the United Arab Emirates University community addressed the major challenges faced by the University's network security professionals.
Tags : 
united arab emirates, united arab emirates university, network security, security, network
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn why you need to embrace next-generation firewalls to stay ahead of the newest threats to IT with this whitepaper from HP
Tags : 
next generation firewall, firewall, next-gen, whitepaper, cloud computing
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : 
mobile apps, applications, security threats, mobile computing, security vulnerabilities
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This report details the current state of the security management market and what to expect moving forward.
Tags : 
security, testing, security controls, security management, tools
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.
Tags : 
consumerization, byod, risk management, security, anti spam
    
HP - Enterprise
Case Study Published By: HP - Enterprise     Published Date: Jan 24, 2013
This research brief details best practices for all organizations that would like to produce more secure applications.
Tags : 
research, security, application security, vulnerability testing, software development
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, compliance, mobile, tablets, byod
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.
Tags : 
cloud, security, attacks, risk, virtualization
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast
    
HP - Enterprise
Free Offer Published By: HP - Enterprise     Published Date: Nov 19, 2008
Fortify Software conducted a candid interview with Avi Rubin, Professor at Johns Hopkins University and specialist in the field of eVoting security risks. He discusses the concerns around software security as well as the voting solutions surrounding software independence.
Tags : 
application security, security risks, voting, fortify, fortify software
    
HP - Enterprise
Webinar Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk
    
HP - Enterprise
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search