IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 538 Matches Previous Page  |  Next Page
The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: When done right, securing the cloud can have a domino effect on improved access management, encryption, efficiency, and competitive advantage. Learn more about what 3,476 IT pros worldwide are saying about cloud governance and security practices.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

Gemalto

BT Cloud Compute Security: Together, We Make The Cloud Secure
sponsored by BT
WHITE PAPER: Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

BT

Combating APT in a New Way
sponsored by Exabeam
WHITE PAPER: Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to Advanced Persistent Threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Exabeam

Putting Military Strategy to Work Against Malicious Activity
sponsored by AlienVault
WHITE PAPER: Discover how your enterprise can put the OODA Loop philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breeches. Lean to observe a crisis from all angles, review events in the context of other activity on network to establish a timeline, quickly implement remediation on affected assets, and more.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

AlienVault

Technology Platforms for Business Integration
sponsored by Infor
WHITE PAPER: Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Going global: Get up and running quickly no matter where you need to go
sponsored by Infor
WHITE PAPER: Discover how making sure that key capabilities are built into your technology can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the complexities of expanding your business globally.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Unified Security Management vs. SIEM: a Technical Comparison
sponsored by AlienVault
WHITE PAPER: Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

AlienVault

Applying Data Science to User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Discover how to reduce false positives for User and Entity Behavior Analytics (UEBA) and use machine learning to derive network context. Access this whitepaper now to learn proven techniques from real customer deployments.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Exabeam

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

SSL Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

AWS Cautionary Tales and How to Avoid Becoming One
sponsored by Palerra Inc.
WHITE PAPER: AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Mobility In Government Services: A Checklist Towards Regulatory Compliance
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry

How to get the best protection from your CASB
sponsored by Palerra Inc.
WHITE PAPER: Discover how two approaches to a Cloud Access Security Broker (CASB) strategy stack up to the major concerns CISOs face on a daily basis, such as sharing security responsibilities with their cloud provider, taming unmanaged traffic from their network, and more.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

Palerra Inc.

Demystifying Mobile Security Attacks
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the most common types of mobile attacks – Android malware apps, iOS surveillance, MITM, and more – and what you can do in order to detect and prevent them from causing damage.
Posted: 11 Jul 2016 | Published: 30 Mar 2015

Check Point Software Technologies Ltd.

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

The Top Five Security Threats to Your Business
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Cyber security breaches are more common now than they have ever been. And the risks they present are all serious. This infographic details the top five security threats to your business and highlights a network-based security solution that protects against them.
Posted: 08 Jul 2016 | Published: 30 Jun 2016

Level 3 Communications, Inc.

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Reduce the Threat Attack Surface with Prescriptive and Actionable Data
sponsored by BMC
WHITE PAPER: What disconnected security and operations teams need is unprecedented visibility into their environment's threat stature. Learn how to bridge the so-called "SecOps gap" by prioritizing risks and reducing your overall attack surface.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

BMC
1 - 25 of 538 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement