Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 1 - 25 of 945Sort Results By: Published Date | Title | Company Name
By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
     Brainloop
By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management, data protection, content management system
     Astaro
By: AppAssure Software     Published Date: Jun 29, 2010
Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.
Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery, servers, backup and recovery, storage management, security management, security policies, server virtualization, microsoft exchange
     AppAssure Software
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
     Ounce Labs, an IBM Company
By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
     Nuance Communications
By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive, medium-size business, esg, storage, anti spam, anti spyware, anti virus, application security, policy based management, security management, security policies, web service security, email archiving
     Mimecast
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, backup and recovery, storage management, email security, security management, document management, records management, search and retrieval, email archiving
     Mimecast
By: Mimecast     Published Date: Mar 31, 2009
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc, tco, architecture, secure, storage management, application security, compliance, security management, security policies, web service security, ebusiness, email archiving
     Mimecast
By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance, backup and recovery, storage area networks, security management, information management, email archiving
     Mimecast
By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, email security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
     Mimecast
By: Globality     Published Date: Apr 05, 2018
Frustration with high legal fees and demand for local regulatory knowledge may give boutique law firms an edge with larger clients.
Tags : globality, legal, compliance, regulations, local regulations, security management, security policies, best practices, business management, information management, financial management
     Globality
By: Digital Realty     Published Date: Feb 22, 2018
A new white paper from Digital Realty shows how to improve hybrid cloud computing performance and ramp up agility, security and reliability through its Service Exchange product.
Tags : digital realty, cloud computing, network performance, cloud performance, hybrid cloud, business continuity, security management, application performance management, database security
     Digital Realty
By: Intel     Published Date: May 19, 2017
Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.
Tags : nfv, security, virtualisation, data, network architecture, security management
     Intel
By: WNS     Published Date: Apr 06, 2017
In the recent past, a New York City court convicted 13 people including six medical professionals who had, over several years, milked auto insurance companies of millions in fraudulent claims.
Tags : insurance, auto insurance, wns, benefits of wns, security management, security policies, customer satisfaction, customer service
     WNS
By: Grey Matter     Published Date: Jan 31, 2017
This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.
Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam, application security, internet security, security management
     Grey Matter
By: GE Power     Published Date: Jan 26, 2017
2016 was a year of accelerating change that will impact the power industry across the entire Electricity Value Network. Power leaders determined to thrive in this rapidly changing landscape must understand these trends, how they will impact their business models and the transformative role of digitalization. In this Executive Brief, GE outlines the trends that warrant consideration by every power and utility executive as they develop strategies for success in 2017.
Tags : 2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids, power industry, grid operators, cloud+edge, power plant software, platform economy, infrastructure, security management, best practices, productivity
     GE Power
By: Grey Matter     Published Date: Jan 13, 2017
This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.
Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam, application security, internet security, security management
     Grey Matter
By: Entrust Datacard     Published Date: Nov 29, 2016
Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.
Tags : extended validation certificates, ssl, security, ssl certificate, ev certificate, ev guidelines, application security, security management, security policies
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : ssl, ssl certificate, lifecycle management process, ssl digital certificate, application security, security management, security policies
     Entrust Datacard
By: Lenovo and Intel     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
     Lenovo and Intel
By: IBM     Published Date: Oct 06, 2016
Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.
Tags : cyber security, threats, enterprise insight analysis, data computation, intelligence, hacker detection, internet security, intrusion detection, security management
     IBM
By: Adobe     Published Date: Oct 05, 2016
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : security, security application, cloud, cloud computing, cloud security, application security, security management, security policies
     Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Related Topics

Access Control
718 Documents
Anti Spam
609 Documents
Anti Spyware
674 Documents
Application Security
1060 Documents
Auditing
286 Documents
Authentication
408 Documents
Biometrics
117 Documents
Business Continuity
418 Documents
Change Management
212 Documents
Compliance
683 Documents
Corporate Governance
111 Documents
Database Security
503 Documents
Disaster Recovery
585 Documents
Email Security
585 Documents
Encryption
495 Documents
Firewalls
447 Documents
Hacker Detection
540 Documents
High Availability
318 Documents
HIPAA Compliance
106 Documents
Identity Management
557 Documents
Internet Security
1046 Documents
Intrusion Detection
659 Documents
Intrusion Prevention
736 Documents
IPSec
157 Documents
IT Spending
305 Documents
Linux
100 Documents
Microsoft Exchange
136 Documents
Network Architecture
690 Documents
Network Management
1012 Documents
Network Security
644 Documents
Network Security Appliance
383 Documents
Network Security Certification
21 Documents
Oracle
109 Documents
Password Management
225 Documents
Patch Management
189 Documents
PCI Compliance
245 Documents
PDA
121 Documents
Phishing
200 Documents
Project Management
280 Documents
RAID
74 Documents
Risk Management
375 Documents
Secure Content Management
217 Documents
Secure Instant Messaging
173 Documents
Server Virtualization
546 Documents
Servers
564 Documents
Small Business Networks
294 Documents
SSL
248 Documents
System Management Software
170 Documents
Unix
34 Documents
VPN
225 Documents
Web Service Security
403 Documents
WiFi
186 Documents
Windows Server
124 Documents
Wireless Security
333 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.