Web Transaction Control GatewaysWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsWeb Transaction Control Gateways  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 59 | Next Page

Technical guide on Web Security Gateways by SearchSecurity.com

April 28, 2011 - (Free Research)
Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats. 
(EBOOK) READ ABSTRACT |

Elliptic curve cryptography in transport ticketing by ComputerWeekly.com

May 30, 2014 - (Free Research)
This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How to tackle cloud, IAM, and digital certificate problems in your organization by SearchSecurity.com

July 11, 2013 - (Free Research)
In this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise. 
(EBOOK) READ ABSTRACT |

Secure Web Gateway Overview: Implementation Best Practices by SearchSecurity.com

May 10, 2013 - (Free Research)
This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by SearchSecurity.com

December 19, 2012 - (Free Research)
This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more. 
(EGUIDE) READ ABSTRACT |

E-Book: Technical Guide on Combatting Emerging Web Threats by SearchSecurity.com

June 09, 2010 - (Free Research)
Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them. 
(EBOOK) READ ABSTRACT |

State of Internet Security, Q3 - Q4 2009 by Websense, Inc.

February 16, 2010 - (Free Research)
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009. 
(WHITE PAPER) READ ABSTRACT |

Securing the Borderless Enterprise by Websense, Inc.

February 04, 2010 - (Free Research)
A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

August 18, 2009 - (Free Research)
The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 18, 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

The Essential Guide to Protecting Essential Information by Websense, Inc.

November 2008 - (Free Research)
Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential. 
(ARTICLE) READ ABSTRACT |

Mobile Security Report 2009 by McAfee, Inc.

December 2009 - (Free Research)
Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future. 
(WHITE PAPER) READ ABSTRACT |

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc.

December 2008 - (Free Research)
Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall. 
(ARTICLE) READ ABSTRACT |

Seven Design Requirements for Web 2.0 Threat Protection by McAfee, Inc.

April 2009 - (Free Research)
Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite by McAfee, Inc.

December 2008 - (Free Research)
Check out this brief paper to learn how McAfee helps keep small and medium-sized businesses protected with a smart, simple, secure solution designed for small and medium enterprise customers. McAfee Total Protection for Secure Business provides comprehensive endpoint, email, web, and data security--all in a single, integrated suite. 
(ARTICLE) READ ABSTRACT |

Transaction Tracing through Complex Web Applications by Dell Software

December 2010 - (Free Research)
To ensure that application slowdowns and other revenue-impeding application issues are isolated, diagnosed and fixed quickly, sometimes it’s necessary to trace transactions from their source across all of the technology domains that contribute to transaction response time. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Protecting Against Web Threats by SearchSecurity.com

December 2009 - (Free Research)
Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies. 
(EBOOK) READ ABSTRACT |

Imperva's Web Application Attack Report by Imperva

January 2012 - (Free Research)
Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects. 
(WHITE PAPER) READ ABSTRACT |

Imperva’s Web Application Attack Report by Imperva

July 2011 - (Free Research)
Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects. 
(WHITE PAPER) READ ABSTRACT |

Securing Web Applications and Databases for PCI Compliance by Imperva

July 2009 - (Free Research)
This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency. 
(WHITE PAPER) READ ABSTRACT |

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market by Webroot

December 2010 - (Free Research)
This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs. 
(WHITE PAPER) READ ABSTRACT |

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats by Webroot

September 2009 - (Free Research)
This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats. 
(WHITE PAPER) READ ABSTRACT |

Stopping Fake Antivirus: How to Keep Scareware off Your Network by Sophos, Inc.

September 2011 - (Free Research)
This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: 2010 by Sophos, Inc.

March 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(WHITE PAPER) READ ABSTRACT |

Stopping Data Leakage: Making the Most of Your Security Budget by Sophos, Inc.

February 2009 - (Free Research)
This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit... 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 59 | Next Page

> Explore alternative searches for: Web Transaction Control Gateways

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts