IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 722 Matches Previous Page  |  Next Page
The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to the Anti-Phishing Work Group Q1 report, the number of phishing websites increased 250% from the last quarter of 2015 through the first quarter of 2016. Explore this white paper to reveal how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Business Perception of IT Security: In the Face of an Inevitable Compromise
sponsored by Kaspersky Lab
WHITE PAPER: Companies unanimously state that cyber threats are highly damaging and that cybersecurity is one of the top requirements for business to stay afloat. Take an in-depth look at this security risk report to reveal where enterprises are seeing the most security attacks.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

Market Trends: Automation and Integration Critical to Application Security Tool Adoption
sponsored by IBM
WHITE PAPER: Take a closer look at this market trend report to reveal findings from Gartner research surveys regarding organizations' use of DevOps and security.
Posted: 20 Sep 2017 | Published: 17 Jan 2017

IBM

Data Breaches: Protect Your Organization with an Incident Response Program
sponsored by Cisco Systems, Inc.
WHITE PAPER: When a data breach occurs, your organization could be open to hackers and cybercriminals for up to 200 days. Thankfully, building a rapid incident response program isn't difficult, once you know how. This white paper outlines the critical process and major roles that can make that a reality.
Posted: 20 Sep 2017 | Published: 31 Dec 2015

Cisco Systems, Inc.

Next Generation Firewall Comparative Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report examines 11 next generation firewalls, evaluating for overall security, performance, and TCO. Take a look to see which providers lead the pack, which ones to avoid, and more.
Posted: 20 Sep 2017 | Published: 06 Jun 2017

Cisco Systems, Inc.

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
WHITE PAPER: Hackers have found sophisticated methods to breach the network undetected.In this white paper, guide yourself through the 5-step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Stop Password Sprawl with App Single Sign-on
sponsored by Centrify Corporation
WHITE PAPER: In this white paper, learn the key considerations you should ask before investing and deploying a single sign-on vendor to ensure a smooth transition that aligns with security best practices.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Centrify Corporation

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: Find out how attackers launch different types of DDoS so that you can prepare your organization's security strategy to protect the key apps and data on its network.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

A10 Networks

Evolution of the Online Battlefield
sponsored by Armor
WHITE PAPER: From botnets to APTs and DDoS attacks, learn more about the history of cyberattacks and how they've shaped the current threat landscape.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

The Complexities of the Secure DIY Cloud
sponsored by Armor
WHITE PAPER: Private and DIY clouds present critical implementation and management challenges when it comes to security and compliance. Learn how to simplify cloud security by anticipating the complexities of cloud migration and adoption.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Cost Effectively Handling Encrypted Traffic Across the IT Infrastructure
sponsored by Radware
WHITE PAPER: More website, applications and web services are mandating the use of traffic encryption communications. Inside, discover the appropriate tools for cost effect methods to encrypt traffic across networks that match your specific IT needs.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Radware

Ddos Jumpstart: 11 Best Practices for Mitigating the DDoS of Things
sponsored by A10 Networks
WHITE PAPER: Learn how to proactively detect and mitigate even advanced, multi-vector DDoS attacks. Plus, find out how to protect your network and key business apps by implementing 11 best practices.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

A10 Networks

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

App-Centric Security — Meeting the Needs of the Modern Mobile Enterprise
sponsored by Blue Cedar
WHITE PAPER: IT security executives must constantly assess the best ways to secure mobile devices. Check out this white paper to learn about strategies to increase your mobile security posture.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Blue Cedar

Secure Your VDI If You Don't Wanna Cry Again
sponsored by Citrix Ready
WHITE PAPER: Virtual desktop infrastructures (VDIs) are a popular option for those looking to connect and work with their data from anywhere in the world. It would be easy enough for WannaCry to piggyback its way into your system. This upcoming webcast will teach you how to protect your virtualized environment and key best practices for doing so.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Citrix Ready

Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Citrix

Remediation and Mitigation for Windows Active Directory Security
sponsored by Quest
WHITE PAPER: Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Quest

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Cloud Security: 2017 Spotlight Report
sponsored by Quest
WHITE PAPER: Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Quest

5 Essential Approaches to Securing your WordPress Site
sponsored by Liquid Web
WHITE PAPER: As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Liquid Web

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect
1 - 25 of 722 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement