"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 76 - 100 of 951Sort Results By: Published Date | Title | Company Name
White Paper Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : 
security, security application, siem, siem architecture, it security managers
    
Logrhythm
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
This eBook looks at different threat sharing initiatives and alliances as well as explores how automating intelligence sharing will significantly accelerate detection and response times.
Tags : 
cyberthreat, cyberthreat intelligence, security, it solutions, cti companies
    
Logrhythm
Webinar Published By: Logrhythm     Published Date: Feb 24, 2016
In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.
Tags : 
logrhythm, cyber attacks, cyber threat, security, security application
    
Logrhythm
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
This guide focuses solely on SIEM solutions that are available as appliances that include both the hardware and software needed to deploy them.
Tags : 
security, application security, siem, siem solutions, security management
    
Logrhythm
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable.
Tags : 
data, business practices, data management, data security, software
    
Cisco
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Learn how XenMobile uses EMM to enable BYOD and CYOD/COPE mobility programs without impacting user experience, and without inflating costs or introducing security risks.
Tags : 
citrix, byod, strategy, mobile, mdm
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : 
citrix, enterprise, mobile, network management, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.
Tags : 
citrix, security, data, security management, security policies
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
High-security mobility management is a subset of the enterprise mobility management market that serves organizations with the most-stringent requirements. If security is the highest priority, IT planners should pursue best-of-breed solutions for each platform they intend to support.
Tags : 
citrix, gartner, mdm, emm, security management
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise, infrastructure
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix ShareFile Enterprise helps IT organizations retain control while improving collaboration and productivity. ShareFile completes the mobility story with a rich, enterprise-ready, follow-me data solution. Download white paper to learn more.
Tags : 
citrix, sharefile, enterprise, data, ip telephony
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM).
Tags : 
citrix, byodm cyod, cope, security, security management
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Tags : 
citrix, security, remote access, network performance, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015, network security
    
Citrix Systems, Inc.
White Paper Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption
    
Entrust Datacard
Case Study Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Dec 08, 2015
This infographic illustrates how Entrust PKI Technology is still a key player and global leader in online security.
Tags : 
security, internet security, online security, pki, entrust pki technology
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. Itís based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : 
entrust ssl certificates, security, security application, ssl certificates, ssl certificate management
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : 
ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
This guide explores how EV certificates reduce phishing and man-in-the-middle attacks, bring trust, reduce shopping cart abandonment, protect brand and provide support saving.
Tags : 
verification, ev certificates, identification, extended validation ssl certificates, security
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. Itís based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : 
entrust ssl certificates, security, security application, ssl certificates, ssl certificate management
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory