• RSS
  • Twitter
  • FaceBook
Home > White Papers > Technology > Security

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 3930Sort Results By: Published Date | Title | Company Name
By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
Duo Security - Nethawk
By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
Duo Security - Nethawk
By: OnBase by Hyland     Published Date: Jun 29, 2015
Unstructured content annoys clinicians and staff. They have to find it. They have to wait for it. They have to worry about whether it’s been lost or misplaced. Turn that source of annoyance into a point of efficiency with enterprise content management (ECM) technology. Learn how to find your unstructured content, capture it and make it work for you.
Tags : 
user experience, enterprise content management, productivity, security, compliance
    
OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 29, 2015
With so many enterprise content management (ECM) vendors, choosing one can be overwhelming. Learn how to research ECM vendors, use the RFP process to narrow the playing field and evaluate not only the software, but also the vendor, in a product demo. Read on to ensure you pick the solution and vendor best-suited to meet your organization’s specific needs.
Tags : 
enterprise content management, ecm, vendors, magic quadrant, security
    
OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 29, 2015
Clinicians and staff want to perform better, produce more and enjoy higher levels of satisfaction. Close the gap between a user’s experiences with technology as a consumer and her experiences with technology at work to maximize the impact on your organization’s bottom line.
Tags : 
healthcare it, roi, optimization, return of investment, security
    
OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 29, 2015
Manage medical imaging and documentation better by presenting patient information – in context – in one location. Read on to see how a flexible, enterprise patient viewer helps healthcare IT ensure patient and clinician satisfaction while supporting the market’s healthcare delivery and payment system initiatives.
Tags : 
medical imaging, patient information, enterprise patient viewer, healthcare it, security
    
OnBase by Hyland
By: Cisco     Published Date: Jun 29, 2015
Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?
Tags : 
cisco, cisco aci, technology, security, data center
    
Cisco
By: Cisco     Published Date: Jun 29, 2015
Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.
Tags : 
csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement
    
Cisco
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails
    
Mimecast
By: Cisco     Published Date: Jun 25, 2015
This paper will help you get started with Software Defined Architecture in Several ways, depending on where you are in your journey.
Tags : 
sdn, cisco, cisco aci, software defined architecture, automation
    
Cisco
By: Cisco     Published Date: Jun 24, 2015
This paper explores the main benefits of Cisco ACI Security.
Tags : 
cisco aci security, csico, virtualization, integration, security
    
Cisco
By: Mimecast     Published Date: Jun 22, 2015
Download this whitepaper today and take a good hard look at one of the biggest threats companies are facing – without preparation your company could be next.
Tags : 
spear-phising, cyber attacks, cyber threats, network security, company security
    
Mimecast
By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity
    
Mimecast
By: ZirMED     Published Date: Jun 22, 2015
Read this healthcare providers' guide for expertise on effective revenue cycle management and long-term financial forecasting.
Tags : 
zirmed, cycle management, revnue, compliance, hippa
    
ZirMED
By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud
    
Mimecast
By: Mimecast     Published Date: Jun 22, 2015
To find out if your data is being put at risk, get practical advice on how to eliminate this risk, and find out which vendor hits the ‘Bloor Bullseye’.
Tags : 
file sharing security, file sharing services, best practices, storage services, email security
    
Mimecast
By: Mimecast     Published Date: Jun 22, 2015
Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?
Tags : 
email continuity, microsoft office 365, mimecast, continuity plans, email downtime
    
Mimecast
By: Mimecast     Published Date: Jun 22, 2015
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying its Unified Email Management solution.
Tags : 
unified email management, uem, mimecast, microsoft office 365, email providers
    
Mimecast
By: Tricentis     Published Date: Jun 22, 2015
This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.
Tags : 
testing, tosca testsuit, test, sap, test portfolios
    
Tricentis
By: Tricentis     Published Date: Jun 22, 2015
This paper reveals the reason why people love E2E tests.
Tags : 
end to end testing, testing, test, e2e testing, manual testing
    
Tricentis
By: Nexgate     Published Date: Jun 17, 2015
This report will outline a framework for assigning roles and responsibilities to manage social media risk.
Tags : 
proofpoint, nexgate, social media risk, social media, risk management
    
Nexgate
By: IBM     Published Date: Jun 16, 2015
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, compliance requirements, it risk management strategies, it solutions, security breach
    
IBM
By: IBM     Published Date: Jun 16, 2015
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies
    
IBM
By: IBM     Published Date: Jun 16, 2015
This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : 
data center, mobility, software defined environment, service optimization, business solutions
    
IBM
By: IBM     Published Date: Jun 16, 2015
Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.
Tags : 
enterprise, cloud computing, data centers, cloud-based solutions, it solutions
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter