Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 226 - 250 of 742Sort Results By:Published Date | Title | Company Name
White Paper Published By: Qualys     Published Date: Jul 20, 2012
Vulnerabilities are very common nowadays. Even being a safest network does not mean that it cannot be compromised. It's how you handle these vulnerability and flaws and rectify the issues. In order help the security engineers Qualys, Inc. pioneer security brings free guide on Top 10 reports for Managing Vulnerability. This paper cuts through the data overload generated by some vulnerability detection solutions.
Tags : 
technology, security, vulnerabilities, internet, virus
    
Qualys
White Paper Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus
    
Qualys
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download Bit9's latest Threat Advisor and learn how adopting a positive, proactive, trust-based security model provides better application control, improving endpoint protection against advanced attacks while helping to prove compliance with PCI DSS requirements.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this whitepaper and learn how The Bit9 Parity adaptive application whitelisting solution, integrated into a SIEM console, provides the holistic view necessary to ensure an open network isn't a vulnerable one, and provides a defense-in-depth security strategy that spans network sensors and endpoints.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this whitepaper to learn how Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this case study and learn how an international communications company locks down their domain controllers with Bit9's trust-based application control solution and are now protected against todays modern cyber threats.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : 
vasco, cloud computing, technology, saas applications, authentication
    
VASCO
Webinar Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
White Paper Published By: IBM     Published Date: Jul 02, 2012
Many organizations move a wide variety of sensitive information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Read this paper to learn more about IBM Sterling Managed File Transfer that helps you manage and control the critical information flows in your company's dynamic business networks.
Tags : 
ibm, ftp, secure file transfer, file, business
    
IBM
White Paper Published By: Sourcefire, LLC     Published Date: Jun 29, 2012
When a network is breached attackers are leveraging Information Superiority - they are bringing superior intelligence to bear on network and security device problems and using that to gain access. Learn how to harness the power of Big Data analytics to gain the Information Superiority advantage.
Tags : 
technology, sourcefire, gartner, data management, data protection
    
Sourcefire, LLC
White Paper Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management
    
Navisite- A Time Warner Cable Company
White Paper Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall
    
Imperva
White Paper Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach
    
Rapid7
White Paper Published By: Symantec.cloud     Published Date: May 11, 2012
Read When Good Backups Go Bad: Data Recovery Failures and What to Do About Them to understand backup challenges, impacts, and solutions. Don't let your business fall victim to downtime because of a computer or system failure.
Tags : 
symantec, cloud, backup, technology, system failure
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
anti spyware, anti virus, application security, security management
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: May 11, 2012
Powerful backup and flexible deployment options, including enhanced software, backup appliances, and backup solutions in the cloud, offer flexibility and choice in how you manage backup, allowing you to deploy a modern infrastructure that best suits your IT requirements, business needs, and environment. But how do you know which backup strategy is right for your business? Read this whitepaper to better understand which deployment option could best suit your needs.
Tags : 
symantec, cloud, computing, technology, recovery
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: May 11, 2012
The Symantec 2012 Endpoint Security Best Practices Survey reveals that organizations employing best practices are enjoying dramatically better outcomes when it comes to endpoint protection, and many of these best practices can-and should-be leveraged by SMBs.
Tags : 
symantec, cloud, endpoint security, technology, smb
    
Symantec.cloud
White Paper Published By: F5 Networks Inc     Published Date: Apr 17, 2012
Overcome Citrix VDI implementations challenges to deliver the highest end-user quality, most secure access to virtual desktop, while simplifying your IT infrastructure. Learn how global companies maximize their Citrix investment to increase availability, security, and performance.
Tags : 
citrix, xenapp, xen desktop, vdi, virtual desktop
    
F5 Networks Inc
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Bit9     Published Date: Apr 04, 2012
In tests conducted by the Tolly Group, an independent test lab of third-party validation services, Bit9 Parity Suite outperforms the competition in stopping advanced malware, while providing unrivaled protection against attacks.
Tags : 
bit9, technology, security, security policies, malware
    
Bit9
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search