Web Service Security

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 267Sort Results By: Published Date | Title | Company Name
By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
     Nuance Communications
By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security, web service security, enterprise software, email archiving
     Mimecast
By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
     Nuance Communications
By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive, medium-size business, esg, storage, anti spam, anti spyware, anti virus, application security, policy based management, security management, security policies, web service security, email archiving
     Mimecast
By: Mimecast     Published Date: Mar 31, 2009
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc, tco, architecture, secure, storage management, application security, compliance, security management, security policies, web service security, ebusiness, email archiving
     Mimecast
By: ForgeRock     Published Date: Mar 22, 2018
What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.
Tags : forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data, security policies, web service security, business activity monitoring, customer interaction service, data protection, database security, collaborative commerce, customer experience management, secure content management
     ForgeRock
By: NodeSource     Published Date: Nov 20, 2017
Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.
Tags : nodesource, application development, javascript, web applications, open source, soa, application security, web service security, application performance management, java, soap, web development
     NodeSource
By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : nodesource, xml, software development, digital transformation, open source, web applications, web development, java, .net, soap, infrastructure, business continuity, web service security, application performance management, customer satisfaction, ebusiness, web services, data protection, secure content management
     NodeSource
By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security
     RSA
By: RSA     Published Date: Sep 19, 2017
Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.
Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security, security policies, web service security, best practices, data replication, database security
     RSA
By: Coupa Software Inc.     Published Date: May 30, 2017
Whether you’re looking to make your first eProcurement purchase or expanding technology usage across the full range of spend management process, the Forrester Wave: eProcurement Report identifies leading eProcurement solutions.
Tags : coupa, eprocurement, ecommerce, finance management, epayment, web service security, customer interaction service, customer service, ebusiness, customer experience management, spend management, financial management
     Coupa Software Inc.
By: IBM     Published Date: Oct 06, 2016
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.
Tags : cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation, hacker detection, internet security, web service security
     IBM
By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : security management, web service security
     Webroot Inc
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : citrix, firewall, security, svm, firewalls, intrusion prevention, web service security, data protection
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : citrix, security, netscaler, web, hacker detection, web service security, web services, data protection, secure content management
     Citrix Systems, Inc.
By: Thawte     Published Date: Dec 29, 2015
Promote safer websites and help create a more secure web.
Tags : google ranking, secure web, ssl, seo, web service security, business intelligence, productivity
     Thawte
By: Thawte     Published Date: Dec 29, 2015
There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010, including a host of administration and security improvements.
Tags : application security, web service security, best practices, business intelligence
     Thawte
By: Thawte     Published Date: Dec 29, 2015
To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : website security, myth, reality, misconception, web service security, business intelligence, business management
     Thawte
By: Viavi Solutions     Published Date: Aug 05, 2015
The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.
Tags : apm, security, hacking, performance monitoring, intrusion detection, intrusion prevention, web service security, vulnerability management
     Viavi Solutions
By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls, access control, application security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, ssl, web service security, vulnerability management
     Venafi
By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance, disaster recovery, hacker detection, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management
     IBM
By: Iron Mountain     Published Date: Jun 01, 2015
Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.
Tags : storage management, web service security, business management, collaboration, content delivery, document management, records management, desktop management, financial management
     Iron Mountain
By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers