RSS feed Get our RSS feed

News by Topic

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 2276 - 2295 of 2295Sort Results By: Published Date | Title | Company Name
By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance
     8e6 Technologies
By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy
     IBM
By: IBM     Published Date: Dec 12, 2006
This white paper will outline the components of the Banking Data Warehouse (BDW) and how they assist financial institutions to address the data modeling and data consolidation issues relating to the Basel II Capital Accord. 
Tags : data warehousing, bdw, banking data warehousing, compliance, risk management, basel ii, ibm, security
     IBM
By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit
     Cenzic
By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention
     Third Brigade
By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : web applications, application security, web application security, security code, cenzic, security
     Cenzic
By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : application security, web application security, hacker detection, cenzic, cenzic hailstorm, security
     Cenzic
By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
     Secure Computing
By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention
     Secure Computing
By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
     KACE
By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : it management, ema, enterprise management associates, automated it, it automation, smb, smbs, network management
     KACE
By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : backup, backup and recovery, disaster recovery, compliance, data protection, encryption, access control, backup exec
     Symantec
By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : access control, nac, network, identity management, network access control, security, internet security, trusted network tech
     Trusted Network Tech
By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
     Aomega
By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security
     Nixu
By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention
     Symantec
By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : access control, identity management, access management, authentication, roi, return on investment, a10, a10 networks
     A10 Networks
Start   Previous    78 79 80 81 82 83 84 85 86 87 88 89 90 91 92     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.