Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Internet Security

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Internet Security

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 351 - 375 of 732Sort Results By:Published Date | Title | Company Name
White Paper Published By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection
    
Verdasys
White Paper Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security
    
GFI Software
White Paper Published By: GFI Software     Published Date: Feb 24, 2012
Social networking has changed the way businesses communicate with their customers and partners, with most organizations now incorporating social media into their marketing and communications strategies. Unsurprisingly, the popularity of this new media has also created an influx of social-specific malware. Read to find out more about this trend.
Tags : 
gfi software, technology, security, malware, social media
    
GFI Software
White Paper Published By: HP & Intel     Published Date: Feb 18, 2012
Read the results of this survey of 200 IT professionals sounding off on a wide variety of cloud topics.
Tags : 
convergence, infrastructure, monitoring, network architecture, network performance
    
HP & Intel
White Paper Published By: PC Mall     Published Date: Feb 04, 2012
Learn how VMware virtualization solutions can help you address disasters quickly and easily. This white paper takes an in-depth look at some of the key features of virtualization that help defend your IT environment against disaster.
Tags : 
disaster recovery, virtualzation, smb, pcmall, vmware
    
PC Mall
Webinar Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem
    
Q1 Labs
Webinar Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence
    
Q1 Labs
White Paper Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security
    
Q1 Labs
White Paper Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
Webinar Published By: NetApp and VMware     Published Date: Jan 09, 2012
Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.
Tags : 
netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility
    
NetApp and VMware
White Paper Published By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : 
okta, authentication, single sign on, sign-on, sign on
    
Okta
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Learn How SSL Technology Can Improve Your Site
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive informati
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users
    
Brainloop
Webinar Published By: NetIQ     Published Date: Dec 08, 2011
Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.
Tags : 
automating, webcast, security, vulnerabilities, resources
    
NetIQ
Webinar Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event
    
NetIQ
White Paper Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec
    
PC Mall
White Paper Published By: VMware Dell     Published Date: Dec 07, 2011
This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.
Tags : 
disaster recovery, disaster, security, risk, plan
    
VMware Dell
White Paper Published By: Webroot     Published Date: Dec 06, 2011
In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security
Tags : 
security, facilities, evolve, communication, collaboration
    
Webroot
White Paper Published By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : 
saas, service management, nimsoft, cloud service, delivery
    
Webroot
White Paper Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast
    
HP - Enterprise
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search