IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 435 Matches Previous Page  |  Next Page
A Faster, More Effective Way to Manage Authentication Deployments
sponsored by SafeNet, Inc.
WHITE PAPER: Next generation authentication services can make accessing virtualized and cloud-based services less of a struggle. Read on to see more of what a next generation authentication service can do for your organization.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Solutions enhance compliant digital identity protection for healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Learn the key building blocks of a secure, compliant healthcare system, and how to solve security problems such as identity proofing, HIPAA and HITECH Act compliance, secure access to data, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

VASCO Data Security International

Keys to Balancing Security and Convenience
sponsored by SafeNet, Inc.
WHITE PAPER: This paper examines why the need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

SafeNet, Inc.

Secure by Design: Balancing Security with Employee Productivity
sponsored by Citrix
WHITE PAPER: This white paper explores an app virtualization solution that addresses today's growing IT security challenges while giving users fast, simple, and flexible remote access.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Citrix

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: Access this white paper to get an in-depth look at the major mobile OS platforms, the security issues and features unique to each, and the measures IT needs to take to maintain control while encouraging productivity and mobility.
Posted: 03 Aug 2015 | Published: 30 Apr 2014

Citrix

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

The 10 Keys to Seeing 20/20 on Your EMM Vision
sponsored by Accelerite
WHITE PAPER: Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Accelerite

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

Top 10 reasons to strengthen information security with desktop virtualisation
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how desktop virtualization overcomes information security challenges in today's enterprises. You'll discover how desktop virtualization compares to traditional security models and the top 10 benefits of using desktop virtualization to strengthen information security.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: This white paper examines the modern DoS landscape, and provides several solutions in dealing with current DoS threats, given their fast-growing numbers.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

One Secure Credential for Logical, Physical, Local, and Remote Access
sponsored by HID
WHITE PAPER: This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.
Posted: 24 Jul 2015 | Published: 19 Sep 2013

HID

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 16 Jul 2015 | Published: 28 Feb 2014

Cisco Systems, Inc.

Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More
sponsored by Gartner
WHITE PAPER: Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

Gartner

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jul 2015 | Published: 30 Jun 2015

CloudPassage

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Examining File Sync and Sharing Security
sponsored by IntraLinks, Inc
WHITE PAPER: Inside this white paper, examine one file sync, share, and collaboration platform and how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant and if this approach is right for your organization.
Posted: 18 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

How to Securely Sync, Share, Collaborate, and Manage Business Content
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines one Software as a Service (SaaS) strategy and how it enables mobile content access and secure file sharing outside of the firewall. View now to see how other organizations have used this approach to protect data and files as they are accessed and shared and if it is right for your organization.
Posted: 18 May 2015 | Published: 16 Dec 2014

IntraLinks, Inc

Windows Server 2012: Security in the Enterprise
sponsored by Dell and Microsoft
WHITE PAPER: In the following technology brief, learn about the various security challenges brought about by cloud and virtual desktop practices. Access now and learn how to handle these security deficiencies, including how to leverage Windows Server 2012 to help aid in the process.
Posted: 18 May 2015 | Published: 18 May 2015

Dell and Microsoft
1 - 25 of 435 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement