• RSS
  • Twitter
  • FaceBook
Home > White Papers > Technology > Security

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 4031Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 31, 2015
Manage identities and access.
Tags : 
management, risk, continuous compliance, access control, business continuity
    
IBM
By: IBM     Published Date: Jul 31, 2015
Danger of the web.
Tags : 
application security, hacker detection, internet security, productivity
    
IBM
By: IBM     Published Date: Jul 31, 2015
Security management for mainframe clouds.
Tags : 
application security, compliance, internet security, security management
    
IBM
By: IBM     Published Date: Jul 31, 2015
Guide to security intelligence.
Tags : 
security, data, application security, business continuity, compliance
    
IBM
By: IBM     Published Date: Jul 31, 2015
Prevent credential theft.
Tags : 
threats, corporate, protection, security, application security
    
IBM
By: IBM     Published Date: Jul 31, 2015
Optimize the process of investigating and gathering evidence.
Tags : 
data, security, threats, protection, business continuity
    
IBM
By: IBM     Published Date: Jul 31, 2015
Transform security organization.
Tags : 
implement, plan, respond, cyber security, supply chain
    
IBM
By: IBM     Published Date: Jul 31, 2015
Governance solutions.
Tags : 
identity, protection, critical, solution, compliance
    
IBM
By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : 
data, cost global, security, hacker detection, business intelligence
    
IBM
By: IBM     Published Date: Jul 31, 2015
Threats from within.
Tags : 
data, security, threats, protection, hacker detection
    
IBM
By: IBM     Published Date: Jul 31, 2015
New endpoint solution.
Tags : 
hacker detection, identity management, intrusion detection
    
IBM
By: IBM     Published Date: Jul 31, 2015
Selecting MSS providers.
Tags : 
mss, security, management, network security appliance
    
IBM
By: Tenable Network Security     Published Date: Jul 23, 2015
Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.
Tags : 
risk management, cybersecurity, asset visibility, active scanning, risk blind spot
    
Tenable Network Security
By: Tenable Network Security     Published Date: Jul 23, 2015
This paper talks about IT security challenges within the healthcare industry.
Tags : 
compliance, healthcare organizations, mobility, medical technology, security management
    
Tenable Network Security
By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : 
vendor risk management, vrm, risk management program, penetration tests, risk management strategy
    
BitSight Technologies
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : 
shadow it, hybrid cloud management, visibility, network security, cloud traffic
    
XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : 
gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
    
XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : 
xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking
    
XO Communications
By: IBM     Published Date: Jul 22, 2015
Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : 
productivity, customer service, automation, automated financial transactions, compliance
    
IBM
By: Entrust PKI     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety
    
Entrust PKI
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology, networking
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection
    
CDW-Trend Micro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter