Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security SoftwareWhite Papers (View All Report Types)
1 - 25 of 181 Matches Previous Page  | Next Page
Top Tips for Time Stretched Admins
sponsored by GFI
WHITE PAPER: This guide provides time-saving tips that IT admins at smalland mid-sized companies can use to stay on top of theirworkloads, keep systems running and protected, and maintaina healthy work/life balance.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

GFI

Identity and Access Governance Buyer's Guide
sponsored by Courion Corporation
WHITE PAPER: This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Courion Corporation

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Predicting Attack Paths Within Your Networks
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how one company's advanced security solutions can be leveraged to identify systems within your networks that are vulnerable to exploitation.
Posted: 12 Nov 2014 | Published: 23 Oct 2014

Tenable Network Security

Minimize Check Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

Intel® Mashery™ API Gateway - Tokenization
sponsored by Intel® Services
WHITE PAPER: Intel® Mashery™ API Gateway - Tokenization is a hardware or software appliance that dramatically simplifies PCI DSS & PII compliance and administration for organizations across all industry types that accept, capture, store, transmit or process credit card, debit card, or sensitive personal data.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Modernize your Active Directory
sponsored by Dell Software
WHITE PAPER: This exclusive white paper takes an in-depth look at Active Directory, which can be used to mitigate risk and reduce costs with security software. Read on to learn more.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Dell Software

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

2014 Gartner SIEM Market Report: Which Vendors Deliver?
sponsored by IBM
WHITE PAPER: In this Gartner report, get the facts on today's SIEM vendor landscape with in-depth evaluations and breakdowns of the top players and products in the industry.
Posted: 16 Sep 2014 | Published: 25 Jun 2014

IBM

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Cybercrime Investigation Use Case: Visualizing Data with Investigative Software
sponsored by DomainTools
WHITE PAPER: In this resource, learn how to accelerate your cybercrime investigations with a data visualization tool. Explore a step-by-step use case and discover how simple it is to choose between several visualization options to quickly spot commonalities in large data sets.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

How to Leverage Big Data to Fight Digital Fraud
sponsored by RSA
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA

Inform e-Book Summer 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive resource examines the latest and greatest in the world of IT security, including in-depth reports on advanced malware, security case studies, industry insider interviews, and more.
Posted: 26 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Company

BYODs Dark Side Data Protection
sponsored by HP Autonomy
WHITE PAPER: This white paper explains how data protection issues can cause a lot of problems with BYOD initiatives. It also highlights one solution that helps secure the data on BYOD devices.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

HP Autonomy

The Power to Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: In this white paper, you'll learn the basics of how malware works and how cyber criminals use it to steal valuable data, as well as the best practices for defending your website against them.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Symantec

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

Security in a Faster Forward World: Respond to a Constantly Changing Threat Landscape
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains some of the challenges in the current, evolving threat landscape. It also highlights the benefits of a website protection service with on-demand scale.
Posted: 18 Jul 2014 | Published: 30 Sep 2013

Akamai Technologies

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
1 - 25 of 181 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement