White Papers by Topic: Security

Resources available: 200

Taking a S.O.F.T. Approach Towards Enterprise Mobility Deployments

The impact of mobility as a transformative technology is unlike most other waves giving how it has as much if not more of an impact on the workforce than the workplace. Given this uniqueness, traditional approaches to assessing the merit and value of deploying and managing mobility solutions can often create "analysis paralysis." This document explores a different approach to planning for mobility in your work place and key considerations for managing mobility deployments.

A Guide to Deploying Application-enabled Smart Phones in the Enterprise

Companies must understand the issues around security and manageability of these devices, and the need to supplement the consumer-oriented device vendor supplied tools which often prove inadequate. A majority of enterprises will soon diversify their end user offerings in smart phone devices, including enabling user-liable devices to connect to their systems.

Mobilizing Business Applications with McAfee

The McAfee® Enterprise Mobility Management (McAfee EMM®) solution provides the foundational underpinnings necessary for an organization to succeed with their application mobilization initiatives.It reassures enterprises that their data is protected and their mobile workforce is productive by enablingthem to connect to enterprise applications securely while providing a scalable architecture that can seamlessly manage up to thousands of mobile users.

Prevent Zero Day Attack with Application Whitelisting

Learn how this US Military Command Center's cyber attack exercise can get your security plan in shape. During a recent exercise, this US military command center discovered serious vulnerabilities in their existing security solutions. Despite being on high alert, personnel accidentally introduced malware that immediately broke through all their layers of defense - except one: Bit9 Parity's Application Whitelisting.

US Government Prevents Malware with Application Whitelisting

This high profile US government agency handles extremely sensitive financial data, and as such, must maintain the highest standards for safety, integrity and security of its systems. Faced with a barrage of malware and under constant attack, this agency banks on Bit9's award-winning application whitelisting solution to eliminate unauthorized software, keeping systems secure and significantly reducing support costs.

Stop the Advanced Persistent Threat

The cyber attacks targeting Google and others rang a loud wakeup call: the reactive approach of blacklisting known viruses is no match for today's advanced threats. Gartner's Neil MacDonald wrote, "Application Whitelisting at the endpoints would have stopped these attacks." Download this Microsoft MVP-authored whitepaper to learn how this proactive approach ensures only trusted software runs, rendering new malware useless.

Stop the Advanced Persistent Threat

The cyber attacks targeting Google and others rang a loud wakeup call: the reactive approach of blacklisting known viruses is no match for today's advanced threats. Gartner's Neil MacDonald wrote, "Application Whitelisting at the endpoints would have stopped these attacks." Download this Microsoft MVP-authored whitepaper to learn how this proactive approach ensures only trusted software runs, rendering new malware useless.

Stop the Advanced Persistent Threat

The cyber attacks targeting Google and others rang a loud wakeup call: the reactive approach of blacklisting known viruses is no match for today's advanced threats. Gartner's Neil MacDonald wrote, "Application Whitelisting at the endpoints would have stopped these attacks." Download this Microsoft MVP-authored whitepaper to learn how this proactive approach ensures only trusted software runs, rendering new malware useless.

Protecting Against Targeted Cyber Attacks

Download this Microsoft MVP authored whitepaper to learn how to enforce a white list of approved software to prevent targeted attacks and overcome the Advanced Persistent Threat.

Fortune 1000 Global Information Company

Learn how this global market research firm transitioned from the now end of life Cisco Security Agent (CSA) to Bit9 Parity Suite's advanced threat protection:

* preventing targeted, zero-day attacks
* improving security across more than 36,000 endpoints
* transitioning security alerts from Tier 3 staff to the help desk

©1994-2014 Infoworld, Inc.