Security White Papers

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security
Results 1 - 25 of 4724Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Mar 22, 2018

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

Tags : forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data, security policies, web service security, business activity monitoring, customer interaction service, data protection, database security, collaborative commerce, customer experience management, secure content management, business technology
    
By: OpenText     Published Date: Feb 06, 2018

Read the white paper to learn how you can address key GDPR requirements by consolidating all your data in a central repository to gain tighter security and control, easier access and retrieval.

Tags : opentext, gdpr compliance, eu privacy, data protection, data access, compliance, network security, remote access, access control, policy based management, security policies, best practices, international computing, business technology, data loss prevention
    
By: OpenText     Published Date: Jan 31, 2018

Read this white paper to learn how to minimize, consolidate, and protect your data and how data identification and analytics play a key role in overcoming GDPR compliance concerns.

Tags : opentext, gdpr, gdpr compliance, data protection, data identification, network security, compliance, identity management, web service security, wireless security, customer service, ebusiness, mobile device management
    
By: OpenText     Published Date: Jan 26, 2018

Read this AIIM white paper to learn how to tackle future information privacy and security concerns of new and future technologies such as IoT and machine learning, and prepare for the GDPR.

Tags : opentext, compliance, gdpr, gdpr compliance, information privacy, data protection, privacy, identity management, policy based management, security policies, pci compliance, business technology
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, website development, networking, it management, knowledge management
    
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
By: Astaro     Published Date: Jan 19, 2011

Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.

Tags : astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware, anti virus
    
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco, remote access, remote network management, wireless security, total cost of ownership, configuration management
    
By: Astaro     Published Date: Jan 19, 2011

Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.

Tags : astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management, data protection, content management system
    
By: Coyote Point Systems     Published Date: Sep 02, 2010

In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.

Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network management, servers, disaster recovery
    
By: AppAssure Software     Published Date: Jun 29, 2010

Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.

Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery, servers, backup and recovery, storage management, security management, security policies, server virtualization, microsoft exchange
    
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
    
By: Vision Solutions     Published Date: Feb 26, 2010

Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised

Tags : vision, high availability, ibm, cdp, aix, xsm, disaster recovery, policy based management, as/400
    
By: Mimecast     Published Date: Feb 05, 2010

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security, web service security, enterprise software, email archiving
    
By: Mimecast     Published Date: Feb 05, 2010

Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, storage area networks, storage management, email security, enterprise software, email archiving
    
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010

A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?

Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
By: NEC     Published Date: Dec 16, 2009

The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?

Tags : nec, business communication, productivity, unified communications, uc delivery, business continuity, mobile workers
    
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
By: Acronis Inc.     Published Date: Jul 14, 2009

Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.

Tags : acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, trial download, software trial, free trial, security, backup and recovery, microsoft exchange, windows, windows server
    
By: Acronis Inc.     Published Date: Jul 14, 2009

Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. Register below to receive access for a free trial version.

Tags : acronis, backup, recovery, server, windows, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, windows server, free trial, demo software, bare metal, virtual backup, data deduplication, security, backup and recovery
    
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009

The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.

Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
    
By: Vision Solutions     Published Date: Jun 10, 2009

Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.

Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.