RSS feed Get our RSS feed

News by Topic

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 2251 - 2275 of 2277Sort Results By: Published Date | Title | Company Name
By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access
     LANDesk
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware
     LANDesk
By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : security, network security, access control, compliance, secure content management, information security, physical security, holistic
     RiskWatch
By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : network security, security, compliance, glba, hipaa, risk assessment, risk management, hipaa compliance
     RiskWatch
By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : security management, event management, network security, monitoring, network security, enterprise level security, enterprise security, netiq
     NetIQ Corporation
By: RiskWatch     Published Date: Jan 23, 2007
The single most important trend in security in the next ten years will be the integration of various security elements such as information security, physical security and integrated systems security into a single security function.
Tags : physical security, network security, security management, cso, chief security officer, security integration, riskwatch, security
     RiskWatch
By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability
     RiskWatch
By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance
     8e6 Technologies
By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy
     IBM
By: IBM     Published Date: Dec 12, 2006
This white paper will outline the components of the Banking Data Warehouse (BDW) and how they assist financial institutions to address the data modeling and data consolidation issues relating to the Basel II Capital Accord. 
Tags : data warehousing, bdw, banking data warehousing, compliance, risk management, basel ii, ibm, security
     IBM
By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit
     Cenzic
By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention
     Third Brigade
By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : web applications, application security, web application security, security code, cenzic, security
     Cenzic
By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : application security, web application security, hacker detection, cenzic, cenzic hailstorm, security
     Cenzic
By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
     Secure Computing
By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention
     Secure Computing
By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
     KACE
By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : it management, ema, enterprise management associates, automated it, it automation, smb, smbs, network management
     KACE
By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : backup, backup and recovery, disaster recovery, compliance, data protection, encryption, access control, backup exec
     Symantec
By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : access control, nac, network, identity management, network access control, security, internet security, trusted network tech
     Trusted Network Tech
By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
     Aomega
By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security
     Nixu
Start   Previous    78 79 80 81 82 83 84 85 86 87 88 89 90 91 92    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.