Sort results by: Published date | Company name

Comprehensive Network Access Control [ Source: 3Com ]
September 2009- The isolated corporate network is a thing of the past. Workers armed with laptops and wireless technology means the enterprise network has no boundaries. The modern enterprise network serves not only employees but also customers, partners, contract works and guests. Each with their own role and information access requirements.

This paper outlines a solution that addresses the comprehensive requirements for identifying and controlling network users with features like host posture checking, authorization, monitoring ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Visual Privacy in Healthcare [ Source: 3M ]
July 2012- In this age of electronic health records, we look to high-tech computer technology to help us implement privacy and security control for confidential data. However, many privacy incidents and breaches occur because human error and low-tech, rather than high-tech, shortcomings. The exposure of confidential patient information on a computer or smartphone display is a good example and highlights an important and often overlooked privacy and security risk - the issue of visual privacy.

[WHITE PAPER]
Read Abstract | Go to White Paper

Mitigating Risk - Visual Privacy in Practice [ Source: 3M ]
July 2012- The increasing mobility of workers, coupled with the growth of cloud-based services that allow access to data anytime, has forced security professionals to reexamine enterprise defense. On critical are of data-in-use protection is Visual Privacy - the defense of data as it is displayed on a screen. Enterprises need to rethink their security strategy to include the protection of data as it is displayed. This paper examines three in-practice approaches for integrating visual privacy controls ...

[WHITE PAPER]
Read Abstract | Go to White Paper

AntiVirus and AntiSpam E-mail Scanning [ Source: AXIGEN - Gecad Technologies ]
October 2010- This white paper from Axigen offers a comprehensive analysis of the ways to secure corporate e-mail systems. It offers an opinion on the available approaches, architectures, and deployment options for implementing security applications in the e-mail infrastructure, while keeping a focus on the benefits of using the integrated Axigen-Kaspersky solution.

[WHITE PAPER]
Read Abstract | Go to White Paper

A New Approach to Defeating Spam [ Source: Abaca Technology Corporation ]
March 2008- This white paper describes the problems caused by spam, the techniques spammers use to circumvent conventional anti-spam solutions, and the new paradigm Abaca has developed to combat spam.

[WHITE PAPER]
Read Abstract | Go to White Paper

A Balanced Approach:The Shift to Integrated Security Response Capabilities White Paper [ Source: AccessData Group ]
April 2012- Despite increased regulation, oversight and spending, corporate and government organizations continue to see an increase in cyber security breaches. According to the October 2011 GAO Information Security report, there's been a 650% increase in federal government security incidents over the last five years. And corporate incidents have gone up, not only due to the infiltration of mobile devices - both corporate-owned and employee-owned - but computer-based as well. In an interview on March 28, 2012, Shawn Henry, the FBI's ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Leverage Cloud Security to Defend Your Perimeter [ Source: Akamai ]
September 2010- The complexity and scale of network and information security attacks have exploded in recent years. Traditional perimeter defense solutions have not kept pace with the rapid growth in risk.

This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.

[WHITE PAPER]
Read Abstract | Go to White Paper

Extend Security to the Edge with Web App Security [ Source: Akamai ]
September 2010- As enterprises move more of their business transactions online, they face the challenge of defending a perimeter that grows increasingly porous. The network firewalls that once locked down the enterprise perimeter are ineffective against Web-based attacks.

This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.

[WHITE PAPER]
Read Abstract | Go to White Paper

Testing Dark Pool Trading Systems [ Source: AppLabs ]
May 2008- Dark pool trading systems are intended to trade stocks privately with the objective of liquidating large stock positions at lower costs. Mainly used by institutional traders who trade in large volumes, more financial institutions are using dark pool trading systems to remain competitive.

Organizations adopting dark pool trading systems need to ensure rapid internal development of algorithms, since conditions that support algorithmic variables can change quickly, and requirements can differ greatly from one ...

[WHITE PAPER]
Read Abstract | Go to White Paper

The Growing Threat of Application-Layer DDoS Attacks [ Source: Arbor Networks ]
October 2010- As the size and frequency of DDoS attacks continue to grow, so, too, does the diversity of these attacks. Internet-facing organizations are quickly discovering that they must protect themselves from not only traditional volumetric-based DDoS attacks aimed at their network infrastructure, but also from smaller, more targeted, stealthier application-layer attacks against well-known applications such as HTTP, DNS and VoIP.

This paper discusses the growing threat of application-layer attacks; the significant business impacts these ...

[WHITE PAPER]
Read Abstract | Go to White Paper
View All