Security Management White Papers

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 951Sort Results By: Published Date | Title | Company Name
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
By: Astaro     Published Date: Jan 19, 2011

Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.

Tags : astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management
    
By: AppAssure Software     Published Date: Jun 29, 2010

Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.

Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010

A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?

Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009

The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.

Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
By: Mimecast     Published Date: Apr 16, 2009

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.

Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
By: Mimecast     Published Date: Mar 31, 2009

The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc
    
By: Mimecast     Published Date: Sep 30, 2008

Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.

Tags : mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery
    
By: Mimecast     Published Date: Sep 25, 2008

Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.

Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving
    
By: Intel     Published Date: May 19, 2017

Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.

Tags : nfv, security, virtualisation, data, network architecture, security management, virtualization, infrastructure
    
By: WNS     Published Date: Apr 06, 2017

In the recent past, a New York City court convicted 13 people including six medical professionals who had, over several years, milked auto insurance companies of millions in fraudulent claims.

Tags : insurance, auto insurance, wns, benefits of wns, security management, security policies, customer satisfaction, customer service
    
By: Grey Matter     Published Date: Jan 31, 2017

This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.

Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam
    
By: GE Power     Published Date: Jan 26, 2017

2016 was a year of accelerating change that will impact the power industry across the entire Electricity Value Network. Power leaders determined to thrive in this rapidly changing landscape must understand these trends, how they will impact their business models and the transformative role of digitalization. In this Executive Brief, GE outlines the trends that warrant consideration by every power and utility executive as they develop strategies for success in 2017.

Tags : 2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids
    
By: Grey Matter     Published Date: Jan 13, 2017

This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.

Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam
    
By: Entrust Datacard     Published Date: Nov 29, 2016

Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.

Tags : extended validation certificates, ssl, security, ssl certificate, ev certificate, ev guidelines, application security, security management
    
By: Entrust Datacard     Published Date: Nov 29, 2016

This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.

Tags : ssl, ssl certificate, lifecycle management process, ssl digital certificate, application security, security management, security policies
    
By: Lenovo     Published Date: Oct 14, 2016

Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!

Tags : security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos
    
By: IBM     Published Date: Oct 06, 2016

Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.

Tags : cyber security, threats, enterprise insight analysis, data computation, intelligence, hacker detection, internet security, intrusion detection
    
By: Adobe     Published Date: Oct 05, 2016

The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.

Tags : security, security application, cloud, cloud computing, cloud security, application security, security management, security policies
    
By: Cambium Networks     Published Date: Oct 03, 2016

Download this white paper to learn more about how HCSO improved their capacity and speed for video surveillance with Cambium Networks.

Tags : video surveillance, public safety, crime watch, monitoring streets, security management
    
By: Entrust Datacard     Published Date: Sep 28, 2016

This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.

Tags : ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security, application security, protection, security management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
717 Documents
Anti Spam
609 Documents
Anti Spyware
674 Documents
Application Security
1060 Documents
Auditing
286 Documents
Authentication
408 Documents
Biometrics
117 Documents
Business Continuity
418 Documents
Change Management
212 Documents
Compliance
679 Documents
Corporate Governance
111 Documents
Database Security
500 Documents
Disaster Recovery
585 Documents
Email Security
585 Documents
Encryption
495 Documents
Firewalls
446 Documents
Hacker Detection
538 Documents
High Availability
318 Documents
HIPAA Compliance
106 Documents
Identity Management
557 Documents
Internet Security
1043 Documents
Intrusion Detection
658 Documents
Intrusion Prevention
734 Documents
IPSec
157 Documents
IT Spending
301 Documents
Linux
100 Documents
Microsoft Exchange
136 Documents
Network Architecture
686 Documents
Network Management
1013 Documents
Network Security
642 Documents
Network Security Appliance
383 Documents
Network Security Certification
21 Documents
Oracle
109 Documents
Password Management
225 Documents
Patch Management
189 Documents
PCI Compliance
244 Documents
PDA
121 Documents
Phishing
200 Documents
Project Management
275 Documents
RAID
74 Documents
Risk Management
373 Documents
Secure Content Management
216 Documents
Secure Instant Messaging
173 Documents
Server Virtualization
546 Documents
Servers
565 Documents
Small Business Networks
293 Documents
SSL
247 Documents
System Management Software
170 Documents
Unix
34 Documents
VPN
223 Documents
Web Service Security
402 Documents
WiFi
186 Documents
Windows Server
125 Documents
Wireless Security
330 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.