Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 226 - 250 of 751Sort Results By:Published Date | Title | Company Name
Webinar Published By: Bit9     Published Date: Oct 01, 2012
In this on-demand webcast, learn how to transition your PCI Compliance initiative into an adaptive, proactive security project. Join Chris Strand, QSA and Bit9 Solution Engineer, to learn how you can go Beyond PCI Compliance to Advanced Threat Protection.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 29, 2012
Download Bit9's latest Threat Advisor and learn how you can protect your domain controllers from the Advanced Persistent Threat.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
Webinar Published By: Bit9     Published Date: Sep 29, 2012
Download this webcast to hear how you can take a more proactive security stance in protecting your virtual environments using a next generation security solution.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 29, 2012
In contrast to blacklisting that identifies and blocks known threats, application control technologies such as whitelisting focus on recognizing legitimate functionality, and monitoring, containing or preventing all else. Download this whitepaper to hear the key aspects of today's realistic application whitelisting technologies.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 29, 2012
Download this whitepaper and learn how The Bit9 Parity adaptive application whitelisting solution, integrated into a SIEM console, provides the holistic view necessary to ensure an open network isn't a vulnerable one, and provides a defense-in-depth security strategy that spans network sensors and endpoints.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 29, 2012
Download this whitepaper to learn how Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 29, 2012
Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 29, 2012
Download Bit9's latest Threat Advisor and learn how adopting a positive, proactive, trust-based security model provides better application control, improving endpoint protection against advanced attacks while helping to prove compliance with PCI DSS requirements.
Tags : 
bit9, technology, retail, ecommerce, digital
    
Bit9
Webinar Published By: Bit9     Published Date: Sep 29, 2012
Bit9 is the only company to stop Flame and the RSA attacks. Learn the techniques and approaches that modern attackers are using and why traditional defenses do not work. This webinar discusses the future of cyber attacks. We will get into various advanced persistant threats, how those relate to your own security posture, the tactics you might conisder. Download this on-demand webcast and join Bit9's CTO, Harry Sverdlove, as he explains how these attacks worked and what you can do to stop them.
Tags : 
bit9, technology, online, security, online threats
    
Bit9
Free Offer Published By: GFI     Published Date: Sep 18, 2012
Decreasing budgets, an increasingly mobile workforce, limited staff, time constraints, a growing dependence on e-solutions - you face unique challenges as an IT professional. And you can't afford to disrupt your end users or clientele to implement security solution after security solution. That's where the IT Security Kit comes in. This handy kit provides everything you need to quickly and easily find the antivirus product that's manageable, reliable, cost-effective and just right for your organization.
Tags : 
technology, security, it security, antivirus, antispam
    
GFI
White Paper Published By: Websense     Published Date: Aug 23, 2012
This mobile security white paper outlines the essential steps for mobile security.
Tags : 
mobile security, websense, mobile device management, mdm, malware
    
Websense
White Paper Published By: Success Factors     Published Date: Jul 27, 2012
When it comes to evaluating software investment decisions, such as on- premise vs. cloud-based solutions, many factors must be considered. In particular, pay attention to four key areas: support for business strategy, operations, security, and cost.
Tags : 
success factors, sap, cio goals, cloud solutions, cloud applications
    
Success Factors
White Paper Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus
    
Qualys
White Paper Published By: Qualys     Published Date: Jul 20, 2012
Vulnerabilities are very common nowadays. Even being a safest network does not mean that it cannot be compromised. It's how you handle these vulnerability and flaws and rectify the issues. In order help the security engineers Qualys, Inc. pioneer security brings free guide on Top 10 reports for Managing Vulnerability. This paper cuts through the data overload generated by some vulnerability detection solutions.
Tags : 
technology, security, vulnerabilities, internet, virus
    
Qualys
White Paper Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus
    
Qualys
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download Bit9's latest Threat Advisor and learn how adopting a positive, proactive, trust-based security model provides better application control, improving endpoint protection against advanced attacks while helping to prove compliance with PCI DSS requirements.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this whitepaper and learn how The Bit9 Parity adaptive application whitelisting solution, integrated into a SIEM console, provides the holistic view necessary to ensure an open network isn't a vulnerable one, and provides a defense-in-depth security strategy that spans network sensors and endpoints.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this whitepaper to learn how Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this case study and learn how an international communications company locks down their domain controllers with Bit9's trust-based application control solution and are now protected against todays modern cyber threats.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: Bit9     Published Date: Jul 15, 2012
Download this research report to find out how your security and IT colleagues view the world of advanced cyber threats and find out how you compare.
Tags : 
bit9, cyber, technology, it management, security
    
Bit9
White Paper Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : 
vasco, cloud computing, technology, saas applications, authentication
    
VASCO
Webinar Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
White Paper Published By: IBM     Published Date: Jul 02, 2012
Many organizations move a wide variety of sensitive information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Read this paper to learn more about IBM Sterling Managed File Transfer that helps you manage and control the critical information flows in your company's dynamic business networks.
Tags : 
ibm, ftp, secure file transfer, file, business
    
IBM
White Paper Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management
    
Navisite- A Time Warner Cable Company
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search