ca security

Results 3101 - 3125 of 3431Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security
    
Trend Micro, Inc.
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection, spam
    
McAfee Inc
Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli
    
IBM
Published By: IBM     Published Date: Oct 22, 2009
What is it? Why do I need it? And how does it work?
Tags : 
lotus, ibm, web content management, really simple syndication, rss, security, integration
    
IBM
Published By: NeoSpire Managed Hosting     Published Date: Oct 22, 2009
With the massive amount of information on an ever-evolving subject, understanding and becoming PCI compliant can be a daunting task. The process of becoming PCI compliant following the PCI SSC recommended process involves over 160 steps to a merchant's security system and can easily be misinterpreted. NeoSpire presents the Top 10 Misconceptions about PCI.
Tags : 
pci, neospire, security, compliance, paypal, data security standards
    
NeoSpire Managed Hosting
Published By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : 
quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing, remote, data loss, critical information, private information, customer information, identity management, dlp, data loss protection, mfps, it infrastructure, authentication, mps
    
Quocirca
Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
    
ESET
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : 
ssl, ssl technology, verisign, trust, seal, ev ssl, ssl certificate, trust mark, encryption, online safety, online security, security solutions, verisign
    
VeriSign Incorp.
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : 
saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: IBM     Published Date: Sep 11, 2009
Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.
Tags : 
ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions
    
IBM
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : 
new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance, restore point objectives, rto, disaster recovery, remote office backup consolidation, wafs, vtl, dr solution gap, xpress restore, fulcrum
    
IBM
Published By: TechInsights     Published Date: Sep 01, 2009
Join us at ESC Boston, September 21-24 at the Hynes Convention Center, in Boston, MA. Expo registration is FREE, and advanced registration pricing is still available for conference packages.
Tags : 
embedded systems, conference, boston, esc boston, build your own embedded system, atom, windows embedded, classes, tutorials, wired, wireless, programmable logic, system integration, debugging, verification, dsp, multimedia programming, design team management, security, multi-core
    
TechInsights
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware, and software, achieving pci standards compliance, protect against security breaches
    
NeoSpire Managed Hosting
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
    
Trend Micro SaaS
Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks
Published By: A10 Networks     Published Date: Aug 21, 2009
Troubleshooting network and security problems in a time of crisis is never easy and the need to resolve mysterious machine addresses such as MAC and IP Addresses back to individuals or hosts is often difficult and time consuming. Download this solution sheet and see how A10 Networks' IDentity Proxy Service can automate the task of resolving host addresses back to individuals to speed network and security troubleshooting and forensics.
Tags : 
ip address, identity, network security, identity management, mac address, network management, troubleshoot, a10, a10 networks
    
A10 Networks
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin
Published By: Aventail     Published Date: Aug 21, 2009
Learn how to adequately protect your network while expanding your remote access capabilities. Read the free white paper, 'Increase Productivity and Reduce Security Risks for Teleworkers'.
Tags : 
ssl, vpn, mobile workers, remote workers, mobile workforce, remote workforce, network security, remote access, ssl vpn, productivity, aventail
    
Aventail
Start   Previous    118 119 120 121 122 123 124 125 126 127 128 129 130 131 132    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.