Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 251 - 275 of 944Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : mobility, management, boyd, secure app, data delivery, security management, smart phones, secure content management
     Citrix
By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity, email security, network security appliance, security management, web service security
     Cisco
By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.
Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security, business continuity, email security, internet security, network security appliance, security management, web service security
     Cisco
By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus, hacker detection, high availability, internet security, network security appliance, security management
     McAfee
By: McAfee     Published Date: May 22, 2014
FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.
Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security, email security, encryption, internet security, security management
     McAfee
By: Mimecast     Published Date: May 15, 2014
This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.
Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control, business continuity, security management
     Mimecast
By: Symantec     Published Date: May 02, 2014
Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.
Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, security management, best practices, service management
     Symantec
By: Allscripts     Published Date: May 01, 2014
Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.
Tags : allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional, manual processes, meaningful use, risk management, risk assessment, software updates, secure data, automation, hosted solution, outsourced billing, access control, security management, business process automation
     Allscripts
By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky, anti spyware, anti virus, application security, security management
     Kaspersky
By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption, it management, platforms, security management, information management, messaging
     SilverSky
By: SilverSky     Published Date: Mar 26, 2014
In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.
Tags : silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange, email security, cloud security, it management, security management, microsoft exchange, information management, messaging, email archiving, green computing
     SilverSky
By: SilverSky     Published Date: Mar 26, 2014
This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.
Tags : silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration, security solutions, cloud based email provider, platforms, email security, security management, information management, messaging, email archiving, cloud computing
     SilverSky
By: Symantec     Published Date: Mar 14, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks, network security, anti virus, hacker detection, intrusion detection, intrusion prevention, phishing, security management, web service security
     Symantec
By: Logicalis     Published Date: Mar 07, 2014
Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.
Tags : logicallis, iaas, security, compliance, cloud, cloud security alliance board, infrastructure, application security, internet security, security management
     Logicalis
By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing, policy based management, security management, security policies, best practices
     NAVEX Global
By: IBM     Published Date: Feb 27, 2014
Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.
Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm, risk tolerance, application security, disaster recovery, email security, firewalls, internet security, intrusion detection, intrusion prevention, security management
     IBM
By: Nativeflow     Published Date: Feb 25, 2014
Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.
Tags : office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management, data protection, security management, mobile computing, wireless security, best practices, business intelligence, messaging
     Nativeflow
By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage, data protection, edit shared files, wireless, email security, security management, security policies, web service security, application integration
     Nativeflow
By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : symantec, mobile, mobile applications, security, pki, security management
     Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware, security management
     Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : symantec, mobile, mobile applications, security, code signing certificates, security management, security policies, vulnerability management
     Symantec Corporation
By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware, anti virus, application security, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, security management, vulnerability management
     McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Related Topics

Access Control
718 Documents
Anti Spam
609 Documents
Anti Spyware
674 Documents
Application Security
1060 Documents
Auditing
286 Documents
Authentication
408 Documents
Biometrics
117 Documents
Business Continuity
417 Documents
Change Management
212 Documents
Compliance
682 Documents
Corporate Governance
111 Documents
Database Security
499 Documents
Disaster Recovery
584 Documents
Email Security
585 Documents
Encryption
495 Documents
Firewalls
447 Documents
Hacker Detection
541 Documents
High Availability
319 Documents
HIPAA Compliance
106 Documents
Identity Management
557 Documents
Internet Security
1045 Documents
Intrusion Detection
659 Documents
Intrusion Prevention
737 Documents
IPSec
157 Documents
IT Spending
305 Documents
Linux
100 Documents
Microsoft Exchange
136 Documents
Network Architecture
696 Documents
Network Management
1013 Documents
Network Security
644 Documents
Network Security Appliance
383 Documents
Network Security Certification
21 Documents
Oracle
109 Documents
Password Management
225 Documents
Patch Management
189 Documents
PCI Compliance
245 Documents
PDA
121 Documents
Phishing
200 Documents
Project Management
283 Documents
RAID
74 Documents
Risk Management
376 Documents
Secure Content Management
217 Documents
Secure Instant Messaging
173 Documents
Server Virtualization
546 Documents
Servers
565 Documents
Small Business Networks
294 Documents
SSL
248 Documents
System Management Software
170 Documents
Unix
34 Documents
VPN
225 Documents
Web Service Security
403 Documents
WiFi
186 Documents
Windows Server
124 Documents
Wireless Security
334 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.