Share us:
> Research Library > Technology > Security > Web Service Security
 

Web Service Security

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 263Sort Results By: Published Date | Title | Company Name
White Paper Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact
    
Nuance Communications
White Paper Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business
    
Mimecast
Case Study Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact
    
Nuance Communications
White Paper Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware
    
Mimecast
White Paper Published By: Mimecast     Published Date: Mar 31, 2009
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business
    
Mimecast
Live Event Published By: MISTI (MIS Training Institute)     Published Date: Jun 29, 2017
Attend MISTI’s Application Security eSummit to hear from experts how security teams can work more closely with development team to start a DevSecOps program or just build better relationships through which security can become “baked in” to the development lifecycle.
Tags : 
misti, web applications, application security, devops, secure applications
    
MISTI (MIS Training Institute)
White Paper Published By: IBM     Published Date: Oct 06, 2016
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.
Tags : 
cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation
    
IBM
White Paper Published By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : 
security management, web service security
    
Webroot Inc
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm, firewalls
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web, hacker detection
    
Citrix Systems, Inc.
White Paper Published By: Thawte     Published Date: Dec 29, 2015
Promote safer websites and help create a more secure web.
Tags : 
google ranking, secure web, ssl, seo, web service security
    
Thawte
White Paper Published By: Thawte     Published Date: Dec 29, 2015
There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010, including a host of administration and security improvements.
Tags : 
application security, web service security, best practices, business intelligence
    
Thawte
White Paper Published By: Thawte     Published Date: Dec 29, 2015
To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : 
website security, myth, reality, misconception, web service security
    
Thawte
White Paper Published By: SnapLogic     Published Date: Aug 17, 2015
This whitepaper addresses new elastic iPaaS requirements in detail while highlighting the importance of each.
Tags : 
elastic ipaas requirements, hybrid deployments, minimal lifecycle management, future-proofing, metadata-driven integration
    
SnapLogic
White Paper Published By: Viavi Solutions     Published Date: Aug 05, 2015
The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.
Tags : 
apm, security, hacking, performance monitoring, intrusion detection
    
Viavi Solutions
White Paper Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks
    
Venafi
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : 
data protection, mobility, endpoint management, governance policies, consumerization
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data
    
IBM
White Paper Published By: Iron Mountain     Published Date: Jun 01, 2015
Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.
Tags : 
storage management, web service security, business management, collaboration, content delivery
    
Iron Mountain
White Paper Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
hacker detection, intrusion detection, security management, security policies, web service security
    
Cisco
White Paper Published By: Aerohive Networks     Published Date: May 06, 2015
Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi, security, network security, bandwith limitations, ssid
    
Aerohive Networks
White Paper Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security, network security
    
IBM MaaS360
White Paper Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification
    
IBM
White Paper Published By: Arbor Networks     Published Date: Mar 23, 2015
After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.
Tags : 
arbor networks, arbor, ddos, denial of service, denial of service attacks
    
Arbor Networks
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2017  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service