White Papers by Topic: Security

Resources available: 199

Protecting Digitalized Assets in Healthcare

Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.

File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)

This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security.

Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business

This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files.

InfoWorld Digital Spotlight on Cloud Security

Today, nearly all businesses have one foot in the cloud whether they realize it or not. Learn more.

Why You Need a Next-Generation Firewall

This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.

HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction

In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time to resolve flagged transactions by 80%.

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight applies these techniques to spot and stop attacks.

The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting

This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.

Defense Throughout the Vulnerability Life Cycle

This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.

The Benefits of Automated Log Management

This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.

©1994-2014 Infoworld, Inc.