White Papers by Topic: Security

Resources available: 200

Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business

This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files.

InfoWorld Digital Spotlight on Cloud Security

Today, nearly all businesses have one foot in the cloud whether they realize it or not. Learn more.

Why You Need a Next-Generation Firewall

This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.

HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction

In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time to resolve flagged transactions by 80%.

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight applies these techniques to spot and stop attacks.

Integrating security with HP TippingPoint

This white paper discusses the components and configuration requirements to implement an Intrusion Prevention System (IPS) for CloudSystem Enterprise.

Five Cloud Security Concerns You Must Address

Security for the cloud era should be information centric, built in, adaptive, and proactive. How can you respond to the new threat landscape and efficiently deal with the new security dynamics?

The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting

This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.

Defense Throughout the Vulnerability Life Cycle

This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.

The Benefits of Automated Log Management

This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.

©1994-2014 Infoworld, Inc.