• RSS
  • Twitter
  • FaceBook
Home > White Papers > Technology > Security

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 4560Sort Results By: Published Date | Title | Company Name
By: NAVEX Global     Published Date: Feb 18, 2016
Join NAVEX Global for a complimentary webinar as we reveal the findings from our new 2016 EMEA & APAC State of Compliance Programmes Benchmark Report.
Tags : 
compliance programmes, compliance, ethics, compliance programme webinar, webinar
    
NAVEX Global
By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security
    
SAS
By: Xangati     Published Date: Feb 04, 2016
MBSI was providing approximately 800 virtual desktops to their employees using VMware Horizon with View and 8 VMware ESXi hosts and they were running an additional 140 virtual servers using 5 VMware ESXi hosts – all on a Tegile Hybrid SAN. “It was shortly after we converted from ICD-9 diagnosis codes to ICD-10 codes that performance for the VDI desktops began to suffer noticeably,” explained Shawn Wood, Assistant Manager of Systems Administration, MBSI. “We have relied on Xangati for a number of years now to help us quickly see where bottlenecks are in a short period of time. It's an important part of maintaining the integrity of our infrastructure.” Read more to learn how Xangati helped MBSI address this problem.
Tags : 
xangati, medamerica, mbsi, case study, networking
    
Xangati
By: DLT Solutions     Published Date: Feb 04, 2016
Managing email is one of the fundamental building blocks that every agency must consider when laying out their information governance foundation. An agency’s email management strategy affects stakeholders across the entire organization from legal, Freedom of Information Act (FOIA), records management, and IT, to the agency’s independent internal investigators.
Tags : 
dlt solutions, amazon, web services, information governance, veritas
    
DLT Solutions
By: DLT Solutions     Published Date: Feb 04, 2016
In the federal government, perhaps more than any other entity in the country, data is growing at an unprecedented rate. And that includes not only documents but images, video, audio, sensor data, email, social media files, and more. Without structure, data becomes virtually impossible to find when it’s required for eDiscovery, Freedom of Information Act (FOIA) requests, and compliance with retention mandates. It also becomes much more difficult to apply the type of sophisticated analytics necessary to unlock the true value of that data. Finally, lack of structure also makes it difficult to ensure that data is fully secure in compliance with federal regulations.
Tags : 
dlt solutions, information governance, veritas, data, foia
    
DLT Solutions
By: DLT Solutions     Published Date: Feb 04, 2016
You know the facts. Information is exploding at a rate greater than 40% year-over-year. This is not news. The term information explosion has been around since the 1960’s and for the past 50 years, organizations have been focused on improving their approach for storing information. In the 1970’s, government regulations forced many organizations to establish enterprise-wide records management programs that would ensure the systematic retention of information for set periods of time. Once these new rules were in place, the “store everything” mentality was born As digital began to replace paper and Moore’s Law became a reality, legacy concerns regarding physical storage limitations started to fade. Information Managers finally felt they had the ability to store all of their digital information…so they did. This is where the story gets interesting.
Tags : 
dlt solutions, information governance, data, data curveenterprise, security
    
DLT Solutions
By: DLT Solutions     Published Date: Feb 03, 2016
Application security champions are the main audience for this e-book.
Tags : 
dlt solutions, web application, application security, data, threat
    
DLT Solutions
By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : 
cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
    
BitSight Technologies
By: VCE     Published Date: Jan 27, 2016
In the spring of 2015, the IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report identifies the challenges faced by financial services industry today and how VCE’s Vblock Systems are being used to address them.
Tags : 
vce, vblock systems, idc analysis, innovation, customer experience
    
VCE
By: IBM     Published Date: Jan 27, 2016
This paper describes how predictive analytics can play a critical role in your threat and risk strategy.
Tags : 
ibm, threat, risk, management, security
    
IBM
By: IBM     Published Date: Jan 27, 2016
This white paper reveals seven strategic objectives that can be attained to their full potential only by employing predictive analytics.
Tags : 
ibm, analytics, predictive, strategy, competitive advantage
    
IBM
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise, infrastructure
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
citrix, enterprise, application, enterprise, network security
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : 
citrix, enterprise, mobile, network management, network security
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this white paper, the experiences of four Citrix customers illustrate key use cases for Citrix XenMobile, the most complete enterprise mobility management solution, and the business value it delivers.
Tags : 
citrix, enterprise, mobility, business continuity, best practices
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.
Tags : 
citrix, mobile, . mdm, secure, file sharing
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
citrix, mobile, deployment, app, email security
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.
Tags : 
citrix, sharefile, enterprise, security, email security
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Learn how XenMobile uses EMM to enable BYOD and CYOD/COPE mobility programs without impacting user experience, and without inflating costs or introducing security risks.
Tags : 
citrix, byod, strategy, mobile, mdm
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader.
Tags : 
citrix, gartner, magic quadrant, enterprise, mobility
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
High-security mobility management is a subset of the enterprise mobility management market that serves organizations with the most-stringent requirements. If security is the highest priority, IT planners should pursue best-of-breed solutions for each platform they intend to support.
Tags : 
citrix, gartner, mdm, emm, intrusion prevention
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.
Tags : 
citrix, security, mobile, password management, mobile computing
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.
Tags : 
citrix, security, data, policy based management, security management
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix ShareFile Enterprise helps IT organizations retain control while improving collaboration and productivity. ShareFile completes the mobility story with a rich, enterprise-ready, follow-me data solution. Download white paper to learn more.
Tags : 
citrix, sharefile, enterprise, data, ip telephony
    
Citrix Systems, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter