Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 226 - 250 of 722Sort Results By:Published Date | Title | Company Name
White Paper Published By: F5 Networks Inc     Published Date: Apr 17, 2012
Overcome Citrix VDI implementations challenges to deliver the highest end-user quality, most secure access to virtual desktop, while simplifying your IT infrastructure. Learn how global companies maximize their Citrix investment to increase availability, security, and performance.
Tags : 
citrix, xenapp, xen desktop, vdi, virtual desktop
    
F5 Networks Inc
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Bit9     Published Date: Apr 04, 2012
In tests conducted by the Tolly Group, an independent test lab of third-party validation services, Bit9 Parity Suite outperforms the competition in stopping advanced malware, while providing unrivaled protection against attacks.
Tags : 
bit9, technology, security, security policies, malware
    
Bit9
White Paper Published By: Bit9     Published Date: Apr 04, 2012
he Bit9 Parity Agent is an endpoint sensor tracking all file and process activity in real time, while the Bit9 Parity Server provides a live inventory view into all executable content across all systems.
Tags : 
bit9, technology, security, access control, data protection
    
Bit9
White Paper Published By: Bit9     Published Date: Apr 04, 2012
Download this whitepaper to learn how Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.
Tags : 
bit9, security, anti virus, technology, internet protection
    
Bit9
White Paper Published By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection
    
Verdasys
White Paper Published By: Tata Communications     Published Date: Mar 24, 2012
Today's enterprise networking environment is characterized by international coverage, a single end-to-end network protocol and a wide variety of network topologies, network carriers and access services. Enterprises look to Virtual Private Networks (or VPNs) to provide the same capabilities that private leased lines traditionally delivered, but with cost savings enabled by using a shared network. Read to find out more.
Tags : 
tata communications, vpn, technology, performance optimization, network security
    
Tata Communications
White Paper Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security
    
Akamai
White Paper Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security
    
Akamai
White Paper Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security
    
GFI Software
White Paper Published By: GFI Software     Published Date: Feb 24, 2012
Social networking has changed the way businesses communicate with their customers and partners, with most organizations now incorporating social media into their marketing and communications strategies. Unsurprisingly, the popularity of this new media has also created an influx of social-specific malware. Read to find out more about this trend.
Tags : 
gfi software, technology, security, malware, social media
    
GFI Software
White Paper Published By: SEEBURGER, Inc.     Published Date: Feb 16, 2012
Traditional methods of managing file transfers can't prevent or protect your enterprise from compliance violations: they're insecure, inefficient, and non-auditable.
Tags : 
seeburger, streamline, mft, managed file transfer, network connections
    
SEEBURGER, Inc.
Case Study Published By: Absolute Software     Published Date: Feb 10, 2012
The story of val Verde will help schools innovate better, streamline purchasing, increase cost-efficiencies, and ultimately, provide staff and students with a fleet of optimally running devices.
Tags : 
backup and recovery, blade servers, storage management, access control, disaster recovery
    
Absolute Software
White Paper Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management
    
IBM Software
White Paper Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy
    
IBM Software
White Paper Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy
    
IBM Software
Webinar Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem
    
Q1 Labs
White Paper Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy
    
Cisco
Case Study Published By: Cisco     Published Date: Jan 20, 2012
Discover how Virtual Radiologic uses Cisco Borderless Networks to secure electronic patient information transmitted between hospitals and doctors
Tags : 
cisco, radiology, healthcare, hospitals, sercure
    
Cisco
Webinar Published By: Bit9     Published Date: Jan 17, 2012
Learn how IT teams can protect against spear phishing tactics. Harry Sverdlove, chief technology officer of Bit9 offers a frank discussion about spear phishing - the most common technique used in today's advanced attacks.
Tags : 
bit9, technology, security, cyber attack, phishing
    
Bit9
Case Study Published By: Bit9     Published Date: Jan 17, 2012
Download this case study to see how one financial technology provider used Bit9 Parity Server solution to lockdown their environment, find the infected machines and prevent further damage.
Tags : 
bit9, technology, security, server protection, security policy
    
Bit9
Case Study Published By: Bit9     Published Date: Jan 17, 2012
When handling sensitive cardholder data, organizations need to be sure their POS machines, kiosks, ATMs and servers have the proper solutions to stop advanced attacks. Read how one retail grocery chain proactively secures its endpoints with Bit9 Parity's advanced threat protection.
Tags : 
bit9, technology, security, protection, intrustion detection
    
Bit9
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search