Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security SoftwareWhite Papers (View All Report Types)
101 - 125 of 174 Matches Previous Page  | Next Page
Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Endpoint Protection Performance Benchmarks
sponsored by GFI Software
WHITE PAPER: View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

Global Threat Report - September 2011 Backup strategy for your home users
sponsored by ESET
WHITE PAPER: This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Fast and Effective Endpoint Security for Business
sponsored by ESET
WHITE PAPER: This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Security in Cloud Computing
sponsored by Intel
WHITE PAPER: The cloud’s virtual environment raises many security concerns in businesses, putting intense pressure on IT professionals to enhance security systems. Access this white paper to discover how you can use technology to take control of the security risks in your enterprise.
Posted: 04 Oct 2011 | Published: 04 Oct 2011

Intel

XML Threat Model for REST, SOA and Web 2.0
sponsored by Intel
WHITE PAPER: This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL].
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market
sponsored by Webroot
WHITE PAPER: This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.
Posted: 25 Jul 2011 | Published: 01 Dec 2010

Webroot

Oracle Advanced Security with Oracle Database 11g Release 2
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 08 Jun 2011 | Published: 31 Oct 2010

Oracle Corporation

Mobility Advantage: Why Secure Your Mobile Devices
sponsored by Sybase, an SAP company
WHITE PAPER: The use of enterprise mobile devices is on the rise yet few companies have a mobile security strategy. Get this paper now and see how you can protect your mobile devices and data from unwanted eyes.
Posted: 31 May 2011 | Published: 31 May 2011

Sybase, an SAP company

Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER: As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

Protect sensitive data with multiple layers of loss protection
sponsored by CDW Healthcare
WHITE PAPER: This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.
Posted: 13 Apr 2011 | Published: 12 Apr 2011

CDW Healthcare

Top Ten IT Systems Management Pain Points
sponsored by Kaseya
WHITE PAPER: Managing the IT infrastructure for small and mid-sizedcompanies is a thankless job. People just don’tunderstand the expertise, time and patience required.Kaseya presents the top ten IT management pain pointsand our solution for making your life easier.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

Kaseya

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER: This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

GlobalSign

Protect sensitive data with multiple layers of loss protection
sponsored by CDW Healthcare
WHITE PAPER: This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

CDW Healthcare

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

E911 VoIP Essentials for Enterprise Deployments
sponsored by XO Communications
WHITE PAPER: Deploying VoIP across multiple business locations is a great way to simplify and streamline your distributed network and reduce costs, but how does a business provide E911 effectively across the enterprise and what are the legal requirements?
Posted: 02 Dec 2010 | Published: 02 Dec 2010

XO Communications

Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: In recent years there has been an exponential growth in malware proliferation around the world. Over 30,000 new threats hit the wire each day, requiring more than 3,500 new malware signatures being released daily by anti-malware companies. Read this white paper to learn about Kaspersky's world class, yet affordable anti-malware protection systems.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Kaspersky Lab

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Web security buyers guide
sponsored by Sophos, Inc.
WHITE PAPER: A new approach to web security and control is required that supports the needs of businesses, equipping users with the tools they need to be more effective while eliminating the risks of potential infection from trusted legitimate sites. In addition to good preventive practices it is vital that organizations implement a comprehensive solution.
Posted: 12 Oct 2010 | Published: 06 Oct 2010

Sophos, Inc.

Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER: This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

BlueCoat

Magic Quadrant for Secure Web Gateway
sponsored by BlueCoat
WHITE PAPER: Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

BlueCoat

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift
101 - 125 of 174 Matches Previous Page    3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement