Whitepaper Library
 

web security

Results 201 - 225 of 682Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: HP Inc.     Published Date: Feb 03, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
    
HP Inc.
Published By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
security, bios, threat prevention, threat detection, malware, hacking
    
HP Software
Published By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : 
cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
    
BitSight Technologies
Published By: GeoTrust     Published Date: Jan 21, 2016
It may seem obvious that more people are going online to shop, send emails, manage their bank accounts, and just about everything in between, but when you stop to think about just how many people use the internet, the numbers are dramatic. Just 15 years ago, nearly 27 percent of Britons were internet users; today, almost 90 percent of people in the UK use the internet.
Tags : 
    
GeoTrust
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn what traditional network security solutions can’t do and why your organization needs a web application firewall as a cornerstone of its IT security strategy
Tags : 
citrix, web application, firewall, security, network security, remote access
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security, network security
    
Citrix Systems, Inc.
Published By: Thawte     Published Date: Dec 29, 2015
To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : 
website security, myth, reality, misconception
    
Thawte
Published By: Symantec     Published Date: Nov 30, 2015
With just 7 percent of people still doing all their Christmas shopping in bricks and mortar stores, retailers of every kind need to get their e-commerce experience in gear. Whether it’s e-shopping, click and collect, or even browsing and wish lists – customers are offering you a bumper delivery of data and sales this Christmas. But fail to keep your customers safe with good website security, and all you’ll get is a lump of coal.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
This book can help you keep your websites and your business safe.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec has the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Bienvenue dans La sécurité des sites Web pour les nuls, votre guide des risques que posent les sites non protégés, de la valeur et des différents types de certificats SSL. L’objectif de cet ouvrage : vous aider à sécuriser vos sites Web et votre entreprise.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Protección de sitios web para dummies pretende aclarar qué riesgos supone un sitio web desprotegido, por qué es tan importante usar certificados SSL y en qué se diferencian unos certi-ficados SSL de otros. En definitiva: queremos que aprendas a prote-ger mejor tu empresa y tus sitios web.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec cuenta con la fuente de datos más completa que existe sobre las amenazas en Internet: Symantec ™ Global Intelligence Network, un sistema compuesto por más de 41,5 millones de sensores de ataque que registra miles de incidencias por segundo.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec dispose du système de cyberveille le plus exhaustif de la planète. Son nom : Symantec™ Global Intelligence Network. Doté de plus de 41,5 millions de détecteurs d’attaques, cet observatoire enregistre des milliers d’événements à la seconde.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec vanta la più completa fonte di dati relativi alle minacce Internet, un sapere collettivo raccolto dalla Symantec™ Global Intelligence Network, una rete costituita da oltre 41,5 milioni di sensori di attacco in grado di registrare migliaia di eventi ogni secondo.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Website security is important for every business that has an online presence, but different companies have different needs and compliance requirements.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Unternehmen mit einer ungeschützten Website sind einer Vielzahl von Risiken ausgesetzt. In diesem Buch geht es darum, wie Sie Ihr Unternehmen und Ihre Website schützen können. Einen Schwerpunkt bilden dabei SSL-Zertifikate: wie sie funktionie-ren und warum sie für keine Website fehlen sollten.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Über 41,5 Millionen Angriffssensoren, die pro Sekunde mehrere Tausend Ereignisse registrieren – mit dem Symantec™ Global Intelligence Network verfügt Symantec über einige der umfassendsten Informationsquellen zu Bedrohungen aus dem Internet.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
A Symantec possui a mais abrangente fonte de dados do mundo sobre ameaças na Internet, com a Symantec™ Global Intelligence Network, composta por mais de 41,5 milhões de sensores de ataque e capaz de registrar milhares de eventos por segundo.
Tags : 
    
Symantec
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.