Security IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
|
|
White Paper Published By: Veracode
Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
| |
|
|
|
|
|
White Paper Published By: IBM
Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
| |
|
|
|
White Paper Published By: BAE Systems
Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
| |
|
|
|
White Paper Published By: ForeScout
Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies.
Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
| |
|
|
|
Free Offer Published By: Quest
Published Date: Jul 07, 2012
When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.
| |
|
|
|
White Paper Published By: Thawte
Published Date: Aug 09, 2013
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don’t take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, here are 10 best practices that everyone should follow when using this collaboration tool.
| |
|
|
|
White Paper Published By: McAfee
Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
| |
|
|
|
White Paper Published By: McAfee
Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
| |
|
|
|
White Paper Published By: Cyveillance
Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
| |
|
|
|
White Paper Published By: Tripwire
Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
| |
|
|
|
White Paper Published By: Clearswift
Published Date: Jun 09, 2008
This short guide summarizes ten steps to web security. Do them all, and you'll be better protected than 98% of enterprises out there. But the target never stands still. More than the steps listed here, it's important to focus on the principles behind the steps, including: policy, vigilance, simplification, automation and transparency.
| |
|
|
|
White Paper Published By: LockLizard
Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
| |
|
|
|
|
|
White Paper Published By: EVault
Published Date: Mar 21, 2014
This simple, practical white paper will prove invaluable whether you’re starting fresh or looking to upgrade your current data protection system.
| |
|
|
|
White Paper Published By: EVault
Published Date: Mar 21, 2014
Er zijn heel veel manieren om uw data te back-uppen – dan is het goed om te weten dat 12 Best Practices ze allemaal beslaan. Als u dit compacte whitepaper leest, kunt u in een paar minuten:
•Bepalen of uw back-up en recovery systeem voldoet
•Specifieke stappen bepalen om verbeteringen aan te brengen
•Efficiëntie, betrouwbaarheid en kosten-effectiviteit verhogen
Vul uw gegevens in en download
| |
|
|
|
|
|
White Paper Published By: EVault
Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de:
•Déterminer si votre système de sauvegarde et de restauration est limite
•Identifier les différentes étapes spécifiques pour mettre en avant les améliorations
•Etre moteur en terme d'efficacité, de fiabilité et de rentabilité
Inscrivez-vous pour télécharger.
| |
|
|
|
White Paper Published By: EVault
Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de:
•Déterminer si votre système de sauvegarde et de restauration est limite
•Identifier les différentes étapes spécifiques pour mettre en avant les améliorations
•Etre moteur en terme d'efficacité, de fiabilité et de rentabilité
Inscrivez-vous pour télécharger.
| |
|
|
|
White Paper Published By: CopiaTECH
Published Date: Mar 18, 2008
Larger businesses have more to lose in terms of absolute dollars, but it is the narrow profit margin under which smaller businesses work which makes it important for them to have their information backed up. Learn how to protect your small business in this guide.
| |
|
|
|
|
|
|
|
|
|
Free Offer Published By: IBM
Published Date: Oct 09, 2012
Insights from the 2012 Global Reputational Risk and IT Study: How security, business continuity and technical support can shape the reputation and value of your company.
| |
|
|
|
|
 |
|
|
|
|