Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 226 - 250 of 2276Sort Results By: Published Date | Title | Company Name
White Paper Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Crime alone costs businesses dearly – as much as 5 percent of gross revenue each year.
Tags : 
tyco, security, control, freedom, crime
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Tyco Integrated Security Video Auditing enables the company to leverage their existing quality control and production procedure, providing more functionality without a huge investment.
Tags : 
tyco, security, food processing, manufacturing, quality control
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
With thorough planning and the help of basic access control measures as well as innovative technologies, a more secure school campus can be achieved.
Tags : 
tyco, security, access control, visitor management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Whether it’s worrying about a possible break-in or an employee theft, protecting your business is always a concern. For busy warehouses and manufacturing companies, the worry is even greater, as time lost to responding to a crime means revenue loss. With expensive inventory, an active production site, and workers entering and leaving around the clock, reliable security is a must.
Tags : 
tyco, security, threat, employee theft
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Mobile Security Management can help give you the flexibility and control you need to check on your business wherever you go.
Tags : 
tyco, security, mobile security management, threat
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
In today’s challenging retail world, businesses have little time to spare. Every day, retailers are under extreme pressure to reduce shrink, improve store operations, increase profits and enhance the customer experience, all at the same. When every minute counts, time-saving solutions like source tagging, can help.
Tags : 
tyco, security, source tag, time-saving, retail
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Security concerns differ from industry to industry. So why do many businesses settle for one-size-fits-all security systems? Discover the potential threats to businesses such as car dealerships, restaurants and retailers, and the ways you can better protect against them.
Tags : 
tyco, security, data threat
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : 
tyco, security, commercial, loss prevention
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Building on the experience we’ve gained as the leading name in the security field since 1874, Tyco Integrated Security currently helps protect thousands of schools around the country. And because of our comprehensive offerings, we’ve been able to do so with security solutions specifically designed for each unique situation.
Tags : 
tyco, security, security education, school
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
A healthcare facility must ensure a safe and secure environment for patients, visitors, staff, physicians and suppliers on a 24/7 basis.
Tags : 
tyco, security, hosted video, healthcare application
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
From the assembly line to the checkout line, Tyco Integrated Security is there
Tags : 
tyco, security, retail security
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
A Real-Time Location System (RTLS) that helps monitor equipment, medications, temperature-sensitive products and staff.
Tags : 
tyco, security, rtls asset tracking, location system, real-time
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Omnichannel retailing adds the flexibility of cross-channel and mobile shopping to the unique revenue- and loyalty-building capabilities of the face-to-face retail experience. It offers opportunities to build deeper shopper relationships—or risks ending them, when availability promises go unmet.
Tags : 
tyco, security, omnichannel, store, retail
    
Tyco Integrated Security
White Paper Published By: Rackspace     Published Date: Mar 08, 2016
This white paper focuses specifically on Microsoft’s approach to managing user demands and security concerns, featuring Office 365 and Azure.
Tags : 
rackspace, office 365, microsoft azure, on premise environments, security
    
Rackspace
Software Download Published By: Rackspace     Published Date: Mar 08, 2016
We’ll discuss why hybrid makes sense, common concerns, pitfalls to consider, and best practices for setting up your hybrid infrastructure leveraging Azure Active Directory services with Office 365.
Tags : 
rackspace, office 365, azure, on premise, active directory federation
    
Rackspace
Software Download Published By: Rackspace     Published Date: Mar 08, 2016
Join our featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing.
Tags : 
rackspace, azure, hybrid cloud, cloud, cases
    
Rackspace
White Paper Published By: Level 3     Published Date: Mar 04, 2016
Are You Prepared For Complex Attacks On Your Network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Tags : 
level 3 communications, hybrid security, best practices, it security, hybrid security architecture
    
Level 3
White Paper Published By: Level 3     Published Date: Mar 04, 2016
It’s time to think differently about your network security. Forget the fragmented and reactive approach you’ve used in the past with patchwork point solutions under separate IT silos. According to Frost & Sullivan’s report, you need a holistic approach to network security.
Tags : 
level 3 communications, frost and sullivan, network security, best practices, isp
    
Level 3
White Paper Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management
    
BitSight Technologies
White Paper Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile
    
IBM
White Paper Published By: IBM     Published Date: Feb 29, 2016
In this report, Forrester Research discusses how to transform your infrastructure to better handle today’s digital technologies.  
Tags : 
ibm, forrester, infrastructure, project services, agile
    
IBM
White Paper Published By: IBM     Published Date: Feb 29, 2016
IBM named a leader in Gartner's first ever Magic Quadrant on Disaster Recovery as a Service
Tags : 
ibm, disaster recovery, gartner, magic quadrant, security
    
IBM
White Paper Published By: Lenovo     Published Date: Feb 29, 2016
Find out why ITIC determined that businesses can depend on Lenovo servers.
Tags : 
lenovo, trends, laptop, global server, hardware
    
Lenovo
Webinar Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Automation in Network Security Management
Tags : 
palo alto, network security, data, threat, security
    
Palo Alto Networks
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.