Skip to content
 

security

Results 6451 - 6475 of 7020Sort Results By: Published Date | Title | Company Name
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : 
wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery, risk
    
Riverbed Technology, Inc.
Published By: VeriSign     Published Date: Feb 10, 2011
This paper reveals the latest advances in SSL technology and how these advances ensure your customers have confidence in the security of your site, as well as protecting them from threats such as phishing, data manipulation and other site scams.
Tags : 
verisign, ssl, security, phishing, data manipulation, threats, protection, secure sockets layer
    
VeriSign
Published By: RM Global     Published Date: Feb 22, 2011
A new raised floor panel category for high security data centers and SCIF requiring real-time preemptive under floor security monitoring.
Tags : 
data center, raised floor, data center security, scif, computer room, glass floor panels, raised floor glass panels, glass floor
    
RM Global
Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
    
Confident Technologies
Published By: GlobalSign     Published Date: Mar 18, 2011
Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
Tags : 
malware monitoring, ssl certificates, hosting, web hosts, isp's, integrators, partner program, globalsign, domain registrars, vars, e-commerce solutions, trust and security
    
GlobalSign
Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management, virtualization security, web services management, radiantone, virtual directories, sun directory substitution
    
Radiant Logic, Inc
Published By: ICMDocs     Published Date: Mar 21, 2011
With the significant improvements in scanning technology today and the increased importance of all aspects of security, it is a good time to take another look at and update the factors that are important in selecting a scanni
Tags : 
scanning companies, scanning vendors
    
ICMDocs
Published By: Qualys     Published Date: Apr 05, 2011
To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.
Tags : 
web application security, qualys, vulnerabilities, sql injection, ssi injection, xpath injection, attacks, qualysguard was 2.0, scanning, saas
    
Qualys
Published By: Qualys     Published Date: Apr 05, 2011
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
it security, vulnerability management, risk management, qualysguard, risk optimization, countermeasure, threat, value
    
Qualys
Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus
    
Avocent
Published By: nick.morgan     Published Date: Apr 13, 2011
Reducing the security risks organisations are facing by shifting IT operation to the cloud.
Tags : 
cloud environments, virtual environments, security implications, business benefits, virtual machines, organisations, information, data loss, data interception
    
nick.morgan
Published By: HackerTarget.com LLC     Published Date: Apr 27, 2011
Report detailing the web technologies in use by the worlds top 1 million websites.
Tags : 
web technology, security, cms, websites, server side scripting
    
HackerTarget.com LLC
Published By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : 
ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso, business leaders, security program
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
Learn the 10 critical database activities & behaviors enterprises should audit now.
Tags : 
ibm, guardium, database, audit, security, risk, monitoring, webcast
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring, logging, encryption, policy-based enforcement
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application, webcast
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : 
ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa
    
IBM Corporation
Published By: Freescale Semiconductor     Published Date: Jun 02, 2011
Aspects of functional verification of power aware security architecture
Tags : 
power, system on chip, security
    
Freescale Semiconductor
Published By: Liaison Technologies     Published Date: Jun 03, 2011
This paper explores the use of tokenization as a best practice in improving the security of credit card transactions, while at the same time minimizing the headaches and angst associated with PCI DSS compliance.
Tags : 
liaison, nubridges, gary palgon, dss audit scope, cardholder data, pci dss compliance, tokenization, tokens, taas, direct marketer, cissp, credit card transactions
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : 
liaison, nubridges, data protection, encryption, key management, tokenization, data security, audit trails, database, backup storage
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Aug 15, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : 
gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology, hardware, software, business technology, virtualisation, microsoft, google, apple, iphone, ipad, information technology, ict, open source
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Aug 22, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : 
gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology, hardware, software, business technology, virtualisation, microsoft, google, apple, iphone, ipad, information technology, ict, open source
    
Liaison Technologies
Published By: Integrated Business Services, Inc.     Published Date: Jun 06, 2011
An article exploring the new Web 2.0 threats to organizations.
Tags : 
it security, data loss prevention, intrusion protection, breach, bots, mobiliti
    
Integrated Business Services, Inc.
Start   Previous    252 253 254 255 256 257 258 259 260 261 262 263 264 265 266    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.