Standards  >   Security Standards  >  

WS-Security

RSS Feed   
DEFINITION: WS-Security (Web Services Security) is a proposed IT industry standard that addresses security when data is exchanged as part of a Web service. WS-Security is one of a series of specifications from an industry group that includes IBM, Microsoft, and Verisign. Related specifications include the Business Process Execution Language (BPEL), WS-Coordination, and WS-Transaction. WS-Security specifies enhancements  … 

WS-Security definition sponsored by SearchMicroservices.com, powered by WhatIs.com an online computer dictionary
WS-Security Reports
26 - 50 of 773 Matches Previous Page  |  Next Page
3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile
sponsored by NowSecure
RESOURCE: Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.
Posted: 25 Jun 2020 | Published: 25 Sep 2019

NowSecure

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi Vantara
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi Vantara

5 Steps to Alleviate Endpoint Management Tool Sprawl
sponsored by HCL Software
WHITE PAPER: As organizations are forced to establish long-term remote work strategies, cost-saving initiatives become more important than ever. An effective endpoint management strategy can streamline processes while securing endpoints – at a reduced cost. Read this white paper for 5 ways to alleviate the endpoint management tool sprawl.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

HCL Software

5 Steps to Making Better Security Decisions
sponsored by ThreatQuotient
WHITE PAPER: The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

ThreatQuotient

5 steps to secure the enterprise and be fit for a flexible future
sponsored by Avanade
WHITE PAPER: From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Avanade

5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud
sponsored by Ionic Security
PRODUCT OVERVIEW: In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Ionic Security

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
CASE STUDY: In order to ensure organizations are transitioning to the cloud responsibly, security programs need to be implemented that address the unique challenges each organization faces. In this collection of use cases, discover how 6 organizations overcame various cloud security challenges to ensure their data was protected.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

CyberArk Software, Inc

7 Ways to Take Cybersecurity to New Levels
sponsored by Cisco Umbrella
WHITE PAPER: Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.
Posted: 21 May 2020 | Published: 21 May 2020

Cisco Umbrella

9 Steps to Success with Data Protection
sponsored by Forcepoint
RESOURCE: Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Forcepoint

A Buyer's Guide to Cloud Security
sponsored by Forcepoint
WHITE PAPER: Given the amount of critical data being hosted in the cloud, it should come as no surprise that organizations are taking careful steps to safeguard their sensitive information. In this buyer’s guide, explore evaluation criteria and a competitive analysis designed to equip you with the knowledge to find the right cloud security provider for you.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

A Buyers’ Guide to SecOps
sponsored by VMware International Unlimited Company
EGUIDE: Endpoint detection and response (EDR) tools are emerging as a prominent figure in protecting an organization’s endpoints. Similarly, SecOps tools are quickly becoming critical in ensuring security across the DevOps lifecycle. Read this buyers’ guide for an overview of how to evaluate and select the right tool and vendor.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

VMware International Unlimited Company

A Growth Strategy for Today’s Financial Institutions
sponsored by HID Global
EBRIEF: 47% of debit card users (ages 18-24) say that instant issuance would influence their choice of financial institution. So, it’s no surprise to see banks and credit unions embracing Financial Instant Issuance (Fii) in order to attract new customers. Read this executive brief to learn more about the what, why and how of Fii.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

HID Global

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK: In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Proofpoint

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
sponsored by DivvyCloud
WHITE PAPER: Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

A Proven Approach to Cloud Workload Security
sponsored by CrowdStrike
WHITE PAPER: As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Read this white paper to uncover CrowdStrike’s lessons learned, observational insights and expertise.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

CrowdStrike

A Simpler Approach to Endpoint Security
sponsored by McAfee
PRODUCT OVERVIEW: For today’s security teams, protecting endpoints has never been more difficult due to an expanding disparity between the growing severity of cyberthreats and the shrinking number of skilled security professionals. McAfee looks to remedy this gap – read their solution brief to see what they have to say.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

McAfee

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Thales

Access management: An evaluation and comparison of vendors
sponsored by IBM
RESOURCE: SaaS-delivered access management has become the norm – enabling organizations to provision or prohibit access throughout their dynamic networks. This Gartner Magic Quadrant Report provides an unbiased evaluation of key vendors and offerings within the access management landscape. Download this report to see who were crowned as leaders.
Posted: 07 Aug 2020 | Published: 12 Aug 2019

IBM

Achieving CloudSecOps Maturity
sponsored by DivvyCloud
WHITE PAPER: When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Access Certification: Addressing and Building on a Critical Security Control
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
Posted: 21 Mar 2011 | Published: 01 Jan 2010

Oracle Corporation
26 - 50 of 773 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info