• RSS
  • Twitter
  • FaceBook
Home > White Papers > Technology > Security

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 4716Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Aug 26, 2016
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security
    
Mimecast
By: Kaminario     Published Date: Aug 23, 2016
Successful businesses are nimble and built to scale. At times you might need to grow your sales capacity by bringing more people on board. Other times you might simply need them to get more active, boosting performance. Sometimes you need to do both. To support the ebb and flow of your business your storage should be capable of scaling up capacity while increasing performance. Yet you might be surprised to know that only one All-flash vendor can do so, while keeping costs predictable. Read on to learn about 3 scalabity benefits that will transform your storage purchasing experienc
Tags : 
kaminario, flash, performance, storage, application performance
    
Kaminario
By: EMC Converged Platforms     Published Date: Aug 19, 2016
In this video, ESG analyst Colm Keegan discusses the new VCE VxRail. He explains the rationale for the product, where it fits in the VCE’s portfolio, and addresses the growing demand for HCI systems.
Tags : 
vce, esg, vxrail. hyper-converged, hci systems, networking
    
EMC Converged Platforms
By: EMC Converged Platforms     Published Date: Aug 19, 2016
VxRail is aiding in Land Rover BAR’s quest for the America’s Cup.
Tags : 
data center, data application, network performance, data virtualization, optimization
    
EMC Converged Platforms
By: F5 Networks Inc     Published Date: Aug 16, 2016
Data center refresh cycles and new initiatives tied to business growth and revenue opportunities are leading more organizations to deploy integrated systems, including both converged and hyper-converged infrastructures. IT leaders can see the potential benefits of converged, integrated systems but as applications increase in complexity, virtual workloads grow, and resource demands expand, managing these applications becomes a critical and often stubborn challenge.
Tags : 
application delivery services, systems deployments, integration, idg research, integrated system approach
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : 
ssl, tsl, cyber threats, network security, security
    
F5 Networks Inc
By: Panasonic     Published Date: Aug 04, 2016
Cybersecurity is top of mind for companies with workers using mobile computing devices. Report identifies top field service security risks, why security policies are critical, and includes a security checklist.
Tags : 
cyber risk, security, mobile security, best practices, business management
    
Panasonic
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
IT security used to be about keeping intruders out and selectively letting in friendly visitors, which was best accomplished with a range of perimeter security and end-point solutions. Download this asset to learn more how the landscape has fundamentally shifted since, with much of this shift accelerating in the last 2-3 years. Sponsored by: HPE and Intel®
Tags : 
best practices, technology, security, business management, intel
    
Hewlett Packard Enterprise
By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management
    
BitSight Technologies
By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery
    
Commvault
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup
    
Commvault
By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. In the 24 x 7 BYOD (Bring Your Own Device) time frame in which people now work, they also expect data recovery and access to be lightning fast, and expediency, rather than security, is the driver. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access
    
Commvault
By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : 
commvault, data security, protecting corporate data, commvault file sharing, virtual host costs
    
Commvault
By: Commvault     Published Date: Jul 06, 2016
Data conversations continue to change as all businesses are trying to figure out today's reality of the move to the cloud, anywhere/anytime computing, and the explosive growth of data. These trends have drastically reshaped the IT industry and data management forever. With continued market innovations in storage, cloud, and hyper-converged infrastructures, there are six key modern IT needs that are increasingly the focus of CIO and technology leaders.
Tags : 
commvault, modern data protection, data security, storage, cloud
    
Commvault
By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : 
commvault, snapshot management, replication, array based snapshots, data protection solutions
    
Commvault
By: Commvault     Published Date: Jul 06, 2016
The cloud is changing everything. It’s transforming IT organizations with agility and efficiency like never before, enabling them to realize new IT-as-a-Service delivery models. Yet, with change also comes new challenges. Read more to see how you can solve them so that you can realize the full potential of your next cloud project.
Tags : 
commvault, cloud data, cloud data protection, it as a service, cloud security
    
Commvault
By: EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : 
data management, business practices, data center. data application, enterprise applications, business intelligence
    
EMC
By: EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : 
data management, business practices, data center. data application, enterprise applications, security
    
EMC
By: Cyphort     Published Date: Jun 28, 2016
Computer viruses have plagued personal computers since the original Brain virus began infecting boot sectors in 1986. Originally, these early viruses were annoying, but fundamentally benign in nature. However, once the initial concept of malicious propagating code became established, the actors creating viruses became more sophisticated in their approach. Ultimately, the results of a successful infection were more significant and the impact on an enterprise more severe.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security
    
Mimecast
By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : 
bitsight, data security, risk management, cybersecurity, vrm practices
    
BitSight Technologies
By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management
    
BitSight Technologies
By: MobileIron     Published Date: May 23, 2016
Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.
Tags : 
security, mobile device, windows, best practices, streaming
    
MobileIron
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter