Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 226 - 250 of 705Sort Results By:Published Date | Title | Company Name
Webinar Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem
    
Q1 Labs
White Paper Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy
    
Cisco
Case Study Published By: Cisco     Published Date: Jan 20, 2012
Discover how Virtual Radiologic uses Cisco Borderless Networks to secure electronic patient information transmitted between hospitals and doctors
Tags : 
cisco, radiology, healthcare, hospitals, sercure
    
Cisco
Webinar Published By: Bit9     Published Date: Jan 17, 2012
Learn how IT teams can protect against spear phishing tactics. Harry Sverdlove, chief technology officer of Bit9 offers a frank discussion about spear phishing - the most common technique used in today's advanced attacks.
Tags : 
bit9, technology, security, cyber attack, phishing
    
Bit9
Case Study Published By: Bit9     Published Date: Jan 17, 2012
Download this case study to see how one financial technology provider used Bit9 Parity Server solution to lockdown their environment, find the infected machines and prevent further damage.
Tags : 
bit9, technology, security, server protection, security policy
    
Bit9
Case Study Published By: Bit9     Published Date: Jan 17, 2012
When handling sensitive cardholder data, organizations need to be sure their POS machines, kiosks, ATMs and servers have the proper solutions to stop advanced attacks. Read how one retail grocery chain proactively secures its endpoints with Bit9 Parity's advanced threat protection.
Tags : 
bit9, technology, security, protection, intrustion detection
    
Bit9
White Paper Published By: Bit9     Published Date: Jan 17, 2012
Learn how this New England hospital, breached multiple times by targeted attacks, put an end to the malware with Bit9 Parity. Their IT team can now identify malware and secure PCs and workstations -protecting patient care and privacy.
Tags : 
bit9, technology, hackers, intrusion detection, intrustion protection
    
Bit9
Case Study Published By: Bit9     Published Date: Jan 17, 2012
Is your company's network secure? Are your endpoints and servers secured? Before you answer, read this case study on a US Military Command that discovered no matter how much you educate users, hackers can get through traditional defenses.
Tags : 
bit9, technology, security, network security, secure servers
    
Bit9
Software Download Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity
    
ScriptLogic
White Paper Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
Webinar Published By: NetApp and VMware     Published Date: Jan 09, 2012
Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.
Tags : 
netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility
    
NetApp and VMware
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Learn How SSL Technology Can Improve Your Site
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive informati
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Brainloop     Published Date: Jan 04, 2012
How can IT provide a way for users to share documents without putting the company at risk? This white paper explores collaboration solutions using your current content management, ERP and security infrastructure, as well as a few new ones that might not be on your radar.
Tags : 
brainloop, technology, security, security solutions, infrastructure
    
Brainloop
White Paper Published By: Brainloop     Published Date: Jan 04, 2012
IT can do everything in its power to secure the company's confidential documents, yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, compliance, user compliance, security
    
Brainloop
White Paper Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance, access control
    
Brainloop
White Paper Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users
    
Brainloop
White Paper Published By: Acronis     Published Date: Dec 28, 2011
Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup
    
Acronis
White Paper Published By: Sourcefire, Inc.     Published Date: Dec 22, 2011
It's not a question of if your network will be attacked with advanced malware. It's a question of when it will happen and how you will respond. Advanced malware is changing the way security is managed. This paper will teach you the 5 new laws of anti-malware to keep you protected.
Tags : 
sourcefire, anti-malware, security, technology, data management
    
Sourcefire, Inc.
White Paper Published By: Sourcefire, Inc.     Published Date: Dec 22, 2011
A Next-Generation IPS (NGIPS) offers a logical and essential progression of capabilities needed to protect networks from emerging threats. Pioneered by SourcefireŽ, the NGIPS builds on typical IPS solutions by providing contextual awareness-about network activity, systems and applications, people, and more-to promptly assess threats, ensure a consistent and appropriate response, and reduce an organization's security expenditures.
Tags : 
sourcefire, ips, solutions, network activity, security
    
Sourcefire, Inc.
White Paper Published By: Gomez IT     Published Date: Dec 14, 2011
So how can you ensure that your selection process for cloud service providers and partners is fast but well-informed, based on reliable data and mitigates the risk of hidden surprises? Read to find out.
Tags : 
gomez, technology, cloud computing, cloud service provider, security
    
Gomez IT
White Paper Published By: Gomez IT     Published Date: Dec 14, 2011
This whitepaper addresses the Web experience challenges companies must address when adopting the cloud. It offers perspective and best practices to assist in the evaluation of cloud providers and development of performance SLAs.
Tags : 
gomez, cloud computing, cloud risks, web, security
    
Gomez IT
Webinar Published By: NetIQ     Published Date: Dec 08, 2011
Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.
Tags : 
automating, webcast, security, vulnerabilities, resources
    
NetIQ
Webinar Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event
    
NetIQ
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      
Madison Logic