IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
1 - 25 of 618 Matches Previous Page  |  Next Page
Not All Certificate Authorities are Created Equal
sponsored by Symantec
WHITE PAPER: Learn the importance of continual hardening of the infrastructure that protects cryptographic keys and securing the authentication process that validates identity. Uncover how to maximize SSL encryption effectiveness, utilize daily penetration testing, and create a secure certificate authorities environment.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Symantec

WEBSITE SECURITY THREAT REPORT 2016
sponsored by Symantec
WHITE PAPER: Discover what can be done to steel a website to malware and data breach attacks with comprehensive website security. Also uncover a breakdown of notable security events in 2015, and analyze key takeaways from real attacks on systems just like yours.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Symantec

Designing a Multilayered, In-Depth Defense Approach to Authentication
sponsored by Dell Software
WHITE PAPER: This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Uncover features you should look for in third-party solutions to supplement native security mechanisms.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Streamlining Security Incident and Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Discover vital shortcomings in the way IT defends itself from incidents and breaches, and how to shore up your own defenses. Learn how to integrate security and IT tools while coordinating incident response, reducing time-until-response, and remediate issues quickly.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ServiceNow

To Increase Downloads, First Instill Trust: Security Advantages of Code Signing
sponsored by Symantec
WHITE PAPER: Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 31 Dec 2014

Symantec

Simple Steps to Evolving Your Website Security in 2016
sponsored by Symantec
WHITE PAPER: Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Understanding Shared Responsibility for Microsoft Azure
sponsored by Alert Logic
WHITE PAPER: Discover your enterprise's relationship with Azure for IaaS, PaaS, and both Microsoft's and Azure's Active directories. Also learn 7 Azure best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

Why Code Signing Is an Essential Website Security Feature
sponsored by Symantec
WHITE PAPER: Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

Answering 10 Essential Questions About Website Security
sponsored by Symantec
WHITE PAPER: Even though SSL/TLS certificates and vulnerability scans are a crucial part of website security, they're no longer enough. Are you going beyond the basics? Read on to ascertain the strengths and weaknesses of your current website security strategy by asking yourself 10 crucial questions.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Securing & enabling the Mac-empowered enterprise
sponsored by Code42
WHITE PAPER: This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

Code42

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

Security Information and Event Management (SIEM) Orchestration
sponsored by Intel Security
WHITE PAPER: This document takes a deep look at one SIEM tool, and examines how it optimizes incident response processes. Explore ways to block threats more effectively, identify compromises, implement quick remediation, and more.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Intel Security

Bringing IT and Security Together for Better Breach Response
sponsored by ServiceNow
WHITE PAPER: Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your remediation efforts quicker and more efficient, while improving the clarity of your network security status.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Learn how the disconnect between security and IT tools can lead to seemingly lackadaisical security responses to serious breaches. Access this resource to compare security response approaches, and get a short checklist to evaluate how the right security operations solution can support your enterprise.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices, as well as how to apply them to cloud-based infrastructures and 5 considerations for securing hybrid clouds. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper and discover how you can securely scale protection to your cloud infrastructure and workloads, and segment both within the cloud and between endpoints, enterprise networks, and the cloud to keep your data safe.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

The Security Fabric of The Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.
Posted: 22 Sep 2016 | Published: 22 Apr 2016

Fortinet, Inc.

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Building Natural Active Immunity against Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Fortinet, Inc.

Report: The Impact of Security Threats on Business
sponsored by Radware
WHITE PAPER: In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware
1 - 25 of 618 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement