Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 351 - 375 of 2296Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Dec 29, 2015
In this IBM limited-edition Dummies book, you’ll learn what operational decision management (ODM) is and how it can benefit your organization.
Tags : 
ibm, odm, operational decision management, threat, security
    
IBM
White Paper Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance
    
Black Duck Software
White Paper Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance
    
Black Duck Software
White Paper Published By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : 
black duck, open source, application security, security, compliance
    
Black Duck Software
White Paper Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance
    
Black Duck Software
White Paper Published By: BAE Systems     Published Date: Dec 29, 2015
Learn about the challenges involved in combating first-party fraud and emerging best practices
Tags : 
bae systems, applied intelligence, fraud, first-party fraud, financial institution
    
BAE Systems
White Paper Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach
    
BAE Systems
White Paper Published By: BAE Systems     Published Date: Dec 29, 2015
How to secure your network without busting your IT budget
Tags : 
bae systems, applied intelligence, fortune 500, business security, network security
    
BAE Systems
White Paper Published By: BAE Systems     Published Date: Dec 29, 2015
Detect and monitor for cyber attacks
Tags : 
bae systems, applied intelligence, cyber security, targeted attacks, network security
    
BAE Systems
White Paper Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services
    
BAE Systems
White Paper Published By: Symantec     Published Date: Dec 28, 2015
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Tags : 
code signing, wireless networks, transferring code, content distribution, security
    
Symantec
White Paper Published By: Symantec     Published Date: Dec 28, 2015
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.
Tags : 
code signing certificates, enterprise security, web servers, security
    
Symantec
White Paper Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is an expanding part of IT organizations’ strategies, and IT architects are growing more sophisticated in how they think about cloud; however, as of early 2015, relatively few organizations have truly advanced levels of cloud maturity. In IDC’s recent worldwide CloudView Survey, we discovered that nearly 60% of organizations are currently using or planning to implement some form of cloud — whether for a single project or their portfolio, for test/development environments, or to run mission-critical applications 24 x 7 — but only 25% have reached the level that IDC would call “mature”— that is, building repeatable, managed, or optimized cloud strategies. There is significant room for improvement.
Tags : 
cisco, cloud adoption, public cloud, private cloud, productivity
    
Cisco
White Paper Published By: Cisco     Published Date: Dec 24, 2015
Technology Design Guide
Tags : 
cisco, campus, wireless, lan, technology guide
    
Cisco
White Paper Published By: F5 Networks Inc     Published Date: Dec 11, 2015
An app-centric strategy allows you to maintain control over your cloud applications--providing the same availability, performance, and security services across your hybrid environment.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Dec 11, 2015
This white paper explains programmability's pivotal role in realizing the promise of SDN, outlining all of the components companies need to build a software-defined network that's fully programmable at Layers 2 and 3 and Layers 4 to 7.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Dec 11, 2015
CIOs want harmony. Security directors loathe point products. Networks operations won’t buy into anything new. Stakeholders can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on-premises with a new cloud component.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Dec 11, 2015
An Enterprise Mobility Gateway helps organizations scale, manage, secure, optimize and control today’s required anytime, anywhere network, cloud, and application access.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility
    
F5 Networks Inc
White Paper Published By: Citrix Systems     Published Date: Dec 10, 2015
Simple, secure ways to deliver a great experience for remote users.
Tags : 
citrix, remote access, mobile workstyles, multidevice, security
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Dec 10, 2015
When vendors compete, desktop virtualization customers win. Moore’s Law and market forces lead to better solutions at a lower cost.
Tags : 
citrix, desktop virtualization, app, virtualization, mobility
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Dec 10, 2015
12 Ways App & Desktop Virtualization is Transforming IT
Tags : 
citrix, desktop virtualization, app, virtualization, mobility
    
Citrix Systems
White Paper Published By: IBM     Published Date: Dec 03, 2015
This paper outlines how to enhance disaster recovery testing with a structured approach to validating full business recoverability in the event of an outage.
Tags : 
ibm, resiliency program, functional validation, disaster recovery, security
    
IBM
White Paper Published By: ThingWorx     Published Date: Dec 02, 2015
The evolution of products into intelligent, connected devices— which are increasingly embedded in broader systems—is radically reshaping companies and competition.
Tags : 
thingworx, network, manufacturing, intelligent device, product
    
ThingWorx
White Paper Published By: ThingWorx     Published Date: Dec 02, 2015
Security is a primary concern of ThingWorx customers — especially device manufacturers and end-customers that deliver and use connected products. These customers demand a proven solution that protects them and their customers against hackers, malware and unsafe operations.
Tags : 
thingworx, security, operations, audit, customer
    
ThingWorx
White Paper Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security
    
ArborNetworks
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.