Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 269Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Mar 22, 2018

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

Tags : forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data, security policies, web service security, business activity monitoring, customer interaction service, data protection, database security, collaborative commerce, customer experience management, secure content management, business technology
    
By: OpenText     Published Date: Jan 31, 2018

Read this white paper to learn how to minimize, consolidate, and protect your data and how data identification and analytics play a key role in overcoming GDPR compliance concerns.

Tags : opentext, gdpr, gdpr compliance, data protection, data identification, network security, compliance, identity management, web service security, wireless security, customer service, ebusiness, mobile device management
    
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
    
By: Mimecast     Published Date: Feb 05, 2010

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security, web service security, enterprise software, email archiving
    
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive, medium-size business, esg, storage, anti spam, anti spyware, anti virus, application security, policy based management, security management, security policies, web service security, email archiving
    
By: Mimecast     Published Date: Mar 31, 2009

The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc, tco, architecture, secure, storage management, application security, compliance, security management, security policies, web service security, ebusiness, email archiving
    
By: NodeSource     Published Date: Nov 20, 2017

Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.

Tags : nodesource, application development, javascript, web applications, open source, soa, application security, web service security, application performance management, java, soap, web development
    
By: NodeSource     Published Date: Nov 10, 2017

Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.

Tags : nodesource, xml, software development, digital transformation, open source, web applications, web development, java, .net, soap, infrastructure, business continuity, web service security, application performance management, customer satisfaction, ebusiness, web services, data protection, secure content management, business technology
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.

Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security, security policies, web service security, best practices, data replication, database security, business technology, data loss prevention
    
By: Coupa Software Inc.     Published Date: May 30, 2017

Whether you’re looking to make your first eProcurement purchase or expanding technology usage across the full range of spend management process, the Forrester Wave: eProcurement Report identifies leading eProcurement solutions.

Tags : coupa, eprocurement, ecommerce, finance management, epayment, web service security, customer interaction service, customer service, ebusiness, customer experience management, spend management, financial management, business technology, technology, finance
    
By: IBM     Published Date: Oct 06, 2016

Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.

Tags : cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation, hacker detection, internet security, web service security
    
By: Webroot Inc     Published Date: Sep 09, 2016

This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.

Tags : security management, web service security
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.

Tags : citrix, firewall, security, svm, firewalls, intrusion prevention, web service security, data protection
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler

Tags : citrix, security, netscaler, web, hacker detection, web service security, web services, data protection, secure content management
    
By: Thawte     Published Date: Dec 29, 2015

Promote safer websites and help create a more secure web.

Tags : google ranking, secure web, ssl, seo, web service security, business intelligence, productivity, search engine optimization (seo)
    
By: Thawte     Published Date: Dec 29, 2015

There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010, including a host of administration and security improvements.

Tags : application security, web service security, best practices, business intelligence
    
By: Thawte     Published Date: Dec 29, 2015

To help you cut through the confusion, view our essential guide now and separate website security myth from reality.

Tags : website security, myth, reality, misconception, web service security, business intelligence, business management
    
By: Viavi Solutions     Published Date: Aug 05, 2015

The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.

Tags : apm, security, hacking, performance monitoring, intrusion detection, intrusion prevention, web service security, vulnerability management, data loss prevention
    
By: Venafi     Published Date: Jul 27, 2015

To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.

Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls, access control, application security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, ssl, web service security, vulnerability management
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance, disaster recovery, hacker detection, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management, data loss prevention
    
By: Iron Mountain     Published Date: Jun 01, 2015

Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.

Tags : storage management, web service security, business management, collaboration, content delivery, document management, records management, desktop management, financial management, business technology
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End