Whitepaper Library
 

security application

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
    
Hewlett Packard Enterprise
Published By: HPE     Published Date: Dec 23, 2015
Small and midsized businesses (SMBs) face many challenges as they adapt to today’s new style of doing business. Shifting government regulations, threats to network security, requirements for 24x7 application availability and the demands for new methods to work with customers, suppliers and employees require ongoing investments in IT. These issues impact SMBs even harder because of budget constraints and limited IT resources. SMB’s who learn how to efficiently utilize IT assets and increase IT productivity will be successful.
Tags : 
    
HPE
Published By: Dell EMC     Published Date: Nov 08, 2016
Your data center struggles with competing requirements from your lines of business and the finance, security and IT departments. While some executives want to lower cost and increase efficiency, others want business growth and responsiveness. But today, most data center teams are just trying to keep up with application service levels, complex workflows, and sprawling infrastructure and support costs.
Tags : 
data, converged infrastructure, integration, vmware, private clouds, business application
    
Dell EMC
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : 
kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : 
security application, virtualisation, security, kaspersky, security solutions, virtualization
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Download this paper now to learn how you can prevent such an attack and protect your business
Tags : 
prevent cyber-attacks, cyber-attacks, security application, security
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
    
Kaspersky Lab Australia and New Zealand
Published By: Alert Logic     Published Date: Sep 03, 2014
As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.
Tags : 
alert logic, amazon web security solutions, aws business model
    
Alert Logic
Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : 
entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : 
entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper reveals how tools available from Entrust offer one of the most cost-effective solutions to these problems.
Tags : 
entrust solutions, certificates, security, security application, authority, security management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.
Tags : 
ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security, application security, protection
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
Published By: Venafi     Published Date: Aug 07, 2015
Most organisations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative.
Tags : 
eliminate blind spots, ssl, security, security application
    
Venafi
Published By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : 
cyberattacks, security, cybercriminals, security application
    
Venafi
Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications
    
Venafi
Previous   1 2    Next    
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.