Searched for: "security white paper"
- Security (397)
- Data Management (79)
- Mobility (71)
- Data Centers (27)
- Software (25)
- Collaboration (24)
- Cloud (22)
- Big Data (19)
- Networking (19)
- Storage (16)
- Cxo (15)
- Virtualization (15)
- Developer (12)
- Project Management (9)
- Enterprise Software (6)
- Social Enterprise (6)
- Tech Industry (5)
- Banking (4)
- Hardware (3)
- Microsoft (3)
- After Hours (2)
- Android (1)
- Start-Ups (1)
About 786 results for "security white paper"
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
This White paper Details how the EMC Isilon OneFS architecture provides high availability and data protection needed to meet the challenges organizations face as they deal with the...
This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent sol...
The threat against networks today is greater than it has ever been. If there is a weakness it will be found and ruthlessly exploited. Designing an effective defense against these...
IPv6 leakage and DNS hijacking in commercial VPN clients are explored in a recent academic paper. Find out what the researchers discovered.
Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state
Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective i...
Biometrics and passwords are converted into digital bits and, from that point on, equally usable by bad guys. Learn how HYPR's engineers made biometrics more secure.
In this white paper, learn how your business can achieve regulatory and industry compliance when moving Personally Identifiable Information, Protected Health Information, proprieta...
Hackers penetrate organisations and steal information through vulnerabilities in software applications. Yet less than half of IT organisations have confidence in the security of th...