RSS feed Get our RSS feed

News by Topic

securing

Results 326 - 350 of 465Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 30, 2015
Big data analytics to help better protect and secure.
Tags : healthcare, enterprise, security, data
     IBM
By: Symantec     Published Date: Oct 02, 2012
How Code Signing Can Bolster Security for Mobile Applications
Tags : mobile app market, securing, code, signing, certificates
     Symantec
By: Symantec     Published Date: Apr 04, 2013
How Code Signing Can Bolster Security for Mobile Applications
Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
     Symantec
By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : security, mobile, mobile app, code, mobile application, code signing
     Symantec Corporation
By: Symantec.cloud     Published Date: Oct 11, 2012
The emergence of mobile applications has fundamentally changed the way that millions of people around the world work, play, and communicate. Meanwhile, cybercriminals want to infect and exploit as many mobile devices as they can to steal information.
Tags : symantec, phishing, malware, security, internet security, mobile security, mobile
     Symantec.cloud
By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : endpoint proliferation, ids, ips, externalization, cisco, security
     Cisco
By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : clearswift, network security, internet security, web security
     Clearswift
By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
     Trend Micro, Inc.
By: VeriSign     Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : verisign, mobile apps, code signing, mobile application development, signing certificates
     VeriSign
By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
     bitglass
By: Websense     Published Date: Sep 27, 2010
Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.
Tags : websense, social network, facebook, linkedin, twitter, data risk, data security, web security
     Websense
By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : palo alto, systems, software, security
     Palo Alto Networks
By: WatchGuard     Published Date: Oct 16, 2012
Businesses of all sizes have leveraged virtualization to improve utilization and reduce costs. Virtualization - Are You Secure? This white paper explores the advantages of virtualization and the potential security challenges that come with it.
Tags : watchguard, infrastructure, virtualization, cloud computing, security, it security, data security
     WatchGuard
By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies
     Norse
By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment. Often referred to as private cloud, these projects are fueling significant expansion into what can be referred to as the public cloud.
Tags : 
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment.
Tags : palo alto, virtualization, cloud, firewall, security, digital
     Palo Alto Networks
By: Citrix     Published Date: May 08, 2014
This white paper reports on the increasing desktop virtualization and the products designed to meet the new requirements.
Tags : virtual desktop infrastructure, security, mobility, citrix netscaler
     Citrix
By: Blue Lane     Published Date: Apr 03, 2007
Andreas Antonopoulos, SVP & Founding Partner of Nemertes Research, discusses the challenges of securing the new virtual datacenter.
Tags : virtualization, datacenter, security, vulnerability, vmware, virtualshield, security, patching
     Blue Lane
By: Intel Corp.     Published Date: Apr 25, 2012
Read the paper now and learn how to implement secure virtualization and discover the benefits that could be achieved.
Tags : virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
     Intel Corp.
By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing
     IBM Software
By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : web applications, application security, web application security, security code, cenzic, security
     Cenzic
By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security
     Entrust Datacard
By: Thawte     Published Date: Aug 08, 2013
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security
     Thawte
By: Thawte     Published Date: Oct 06, 2014
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.
Tags : apache web server, digital certificate, ssl certificate, benefits
     Thawte
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics