Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Internet Security

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Internet Security

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 351 - 375 of 577Sort Results By:Published Date | Title | Company Name
White Paper Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment
    
Shavlik Technologies
White Paper Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve
    
Centrify Corporation
White Paper Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity
    
The Bunker
White Paper Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will look at aligning security processes, the human element of security, with the latest security technologies - creating a secure barrier against today's most insidious threats.
Tags : 
messagelabs symantec hosted services, best practices, security process, security technology, threats
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality
    
Symantec.cloud
White Paper Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
White Paper Published By: IBM Software     Published Date: Nov 02, 2010
Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy, and saving time and resources.
Tags : 
ibm cognos predictive analysis, data mining, insurance fraud detection, analytical technique, prevention
    
IBM Software
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
    
Gartner, Inc
White Paper Published By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper to discover 11 considerations to control your email environment.
Tags : 
mimecast, email archiving, saas, software as a service, email management system
    
Mimecast
White Paper Published By: Tripwire     Published Date: Oct 14, 2010
Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.
Tags : 
tripwire, compliance, data protection, cio, automation
    
Tripwire
White Paper Published By: World Data Products, Inc.     Published Date: Oct 04, 2010
This three section white paper explains strategies on how to develop, apply, and maintain a security program.
Tags : 
world data products, secure network, security policies, monitoring and testing, monitoring
    
World Data Products, Inc.
White Paper Published By: RecMan for Google Apps     Published Date: Sep 30, 2010
Millions of Google Apps users may be in violation of legal and organizational compliance standards. Learn how to avoid it.
Tags : 
compliance, records management, google apps, document compliance, compliance management
    
RecMan for Google Apps
White Paper Published By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : 
messagelabs, symantec hosted services, embedded links, worm, security
    
Symantec.cloud
White Paper Published By: B Labs     Published Date: Sep 19, 2010
This white paper briefly overviews a functionality of enterprise-level IM systems and describes new features and tasks that can be important to corporate and business users.
Tags : 
chat, instant messaging, communication, server, messenger
    
B Labs
White Paper Published By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : 
penetration, test, pen, tracesecurity, risk
    
TraceSecurity
White Paper Published By: Symantec.cloud     Published Date: Sep 14, 2010
Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.
Tags : 
symantec.cloud, messagelabs symantec hosted services, email threat, email security, hacking
    
Symantec.cloud
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
Don't let one of your customers become the next statistic. Give your customers an easy, safe and secure online banking experience.
Tags : 
safenet financial services, online banking, security, man-in-the-browser attacks, auditing
    
SafeNet
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
Find out about the most effective defense against MitB attacks.
Tags : 
safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle
    
SafeNet
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
Combat Man-in-the-Browser (MiTB) Attacks with an Integrated Solution that Combines Strong Certificate-Based Authentication from SafeNet with an On-board Portable Browser.
Tags : 
safenet financial services, online banking, security, identity protection, etoken ng-flash
    
SafeNet
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
Tags : 
safenet financial services, online banking threats, cyber attack, compliance, financial services providers
    
SafeNet
White Paper Published By: Brocade     Published Date: Sep 07, 2010
There is a significant problem with cloud offerings, namely that they present new challenges to IT managers, both in general security within their own enterprises and in assessing the risk profiles inherent in each cloud offering they might source.
Tags : 
brocade, cloud computing, security, computerworld uk, internet security
    
Brocade
White Paper Published By: Brocade     Published Date: Sep 07, 2010
The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher-education campuses fertile ground for wireless LAN technology.
Tags : 
brocade, wireless lan, open learning, wlan, intrusion protection system
    
Brocade
White Paper Published By: Symantec.cloud     Published Date: Sep 01, 2010
This white paper gives best practices for creating security policies and includes a set of recommended policy components.
Tags : 
messagelabs us, data protection, security policies, social networking, information security
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : 
messagelabs us, it security, smb, risk management, protection
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : 
messagelabs us, it security, smb, activity logging, vulnerability check
    
Symantec.cloud
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search