IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureWhite Papers (View All Report Types)
1 - 25 of 510 Matches Previous Page  | Next Page
How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Comparing 6 Web Application Firewall Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: This helpful resource from NSS Labs provides detailed comparisons and analyses of web application firewalls from Barracuda, Citrix, F5, Fortinet, Imperva, and Sangfor.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Fortinet, Inc.

The Fortinet Security Census 2014
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper reveals the results of and IT security census of more than 1,600 qualified IT decision makers.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Fortinet, Inc.

How Alert Logic Helped BancBox to Protect Payment Information in the Cloud
sponsored by Alert Logic
WHITE PAPER: This white paper describes Alert Logic's collaboration with BancBox, a payment service provider, to find a way to protect payment information and meet PCI compliance mandates in a cloud environment.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Alert Logic

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Delivering Threat Intelligence to Security Technology Providers and Large Organizations
sponsored by Webroot
WHITE PAPER: One of the best ways to address poor incident detection and incident response is with greater use of information-driven security based upon internal security analytics and external threat intelligence. So what technology and strategies do you need to enable this insight? Read this white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Securely Deliver New Business Services
sponsored by CA Technologies.
WHITE PAPER: This whitepaper examines the critical factors organizations must consider when it comes to meeting the balance between improving end-user engagement and maintaining proper security, focusing on the importance of strong identity and access management.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

CA Technologies.

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 08 Oct 2014 | Published: 10 Jul 2014

Red Hat

Big Data, Big Mess: Sound Cyber Risk Intelligence through “Complete Context”
sponsored by SurfWatch Labs
WHITE PAPER: The following white paper examines the common problem that faces many businesses when it comes to gleaning value from big data and offers insight into how to attain the "complete context" from you big data and how to leverage it for superior business value and benefits.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SurfWatch Labs

Why SSL Certificate Management Is Critical to Today’s Enterprise
sponsored by Symantec Corporation
WHITE PAPER: The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust?
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Symantec Corporation

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Cloud Adoption in Asia Pacific: Overcoming Security Concerns with SSL
sponsored by Symantec Corporation
WHITE PAPER: Cloud computing offers unprecedented opportunities for businesses to cut IT costs while improving their ability to respond to changing strategic demands. Concerns about security, however, are a barrier to adoption.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance
1 - 25 of 510 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement