Advanced Search

Home > White Papers > Technology > Security Popular White Papers

Find White Papers


Related Topics

Access Control
832 Documents
Anti Spam
398 Documents
Anti Spyware
435 Documents
Anti Virus
499 Documents
Application Security
849 Documents
Auditing
219 Documents
Authentication
293 Documents
Biometrics
70 Documents
Business Continuity
302 Documents
Compliance
689 Documents
DDoS
108 Documents
Disaster Recovery
456 Documents
Email Security
550 Documents
Encryption
342 Documents
Firewalls
321 Documents
Hacker Detection
395 Documents
High Availability
262 Documents
Identity Management
683 Documents
Internet Security
851 Documents
Intrusion Detection
575 Documents
Intrusion Prevention
626 Documents
IPSec
121 Documents
Network Security Appliance
339 Documents
Password Management
207 Documents
Patch Management
144 Documents
PCI Compliance
256 Documents
Phishing
146 Documents
PKI
83 Documents
Policy Based Management
241 Documents
Secure Instant Messaging
169 Documents
Security Management
970 Documents
Security Policies
383 Documents
Single Sign On
113 Documents
SSL
170 Documents
Vulnerability Management
427 Documents
Web Service Security
288 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2025Sort Results By: Published Date | Title | Company Name

The Five Pillars of Transparent Data Security

By: WinMagic Inc.     Published Date: Nov 16, 2012
Examining the five key pillars of transparent data security to help eliminate disruptions in your organization's workflow which place undue burden on users and administrators.
Tags : 
winmagic, data security, transparent data security, administrative tools, corporate data security
    
spacer

Tolly Report: Symantec Endpoint Protection 12.1 vs. Trend Micro Deep Security 8

By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security
    
spacer

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

By: Citrix     Published Date: Nov 09, 2012
The tension between security and business productivity has never been so acute. To operate at peak performance, firms need workers to access resources in more ways and places than before -- Read for the man reasons to strengthen IT security in cloud.
Tags : 
citrix, it infrastructure, desktop, virtualization, cloud
    
spacer

EMC Recoverpoint: Business Continuity For Sap Environments Across Distance

By: EMC UK     Published Date: Nov 08, 2012
Business continuity is a critical component to any enterprise data protection strategy and this is especially important for mission critical SAP environments. This paper explores strategies for business continuity and disaster recovery of SAP.
Tags : 
emc recoverpoint, sap environment, business continuity, disaster recovery, sap
    
spacer

PCI DSS Compliance with Stingray Traffic

By: Riverbed     Published Date: Nov 08, 2012
Payment Card Industry Data Security Standard is a set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. Read on to learn about securing your applications for security standard.
Tags : 
riverbed, stingray, pci dss compliance, stingray traffic, security
    
spacer

Dennis Technology Labs Report: Enterprise Anti-Virus Protection July - Sept 2012

By: Symantec     Published Date: Nov 08, 2012
Results are in. Symantec Endpoint Protection rated best in independent, real-world tests recently published by Dennis Technology Labs. These tests are designed to more accurately reflect a simulated user environment.
Tags : 
virual environments, symantec, data security, malware, anti-malware products
    
spacer

Case in Point: System One

By: Webroot     Published Date: Nov 07, 2012
This case study describes how a technical services firm benefited from deploying Webroot for layered Web and endpoint security.
Tags : 
endpoint security, web security, it security, security solutions, case study
    
spacer

Case in Point: Scope

By: Webroot     Published Date: Nov 07, 2012
This case study describes how one of the UK's leading charities used the Webroot Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting.
Tags : 
web security service, case study, deployment, it security, case study
    
spacer

Case in Point: Cascade Microtech

By: Webroot     Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security.
Tags : 
case study, web security, cloud, mobility, mobile security
    
spacer

Security Configuration Management

By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets
    
spacer

Own Your Network with Continuous Monitoring

By: Tripwire     Published Date: Nov 07, 2012
The thought of continuous monitoring is an ancient concept. Many federal agencies are required to continuously monitor their systems. Read on to learn what continuous monitoring is and how organizations can devise a solution that works.
Tags : 
tripwire, continuous monitoring, security, data breach, it security
    
spacer

10 Steps to Risk-Based Seucirty Management

By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data management
    
spacer

Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work

By: Accelops     Published Date: Nov 05, 2012
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.