IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 692 Matches Previous Page  |  Next Page
Redefining Next-generation Endpoint Security Solutions
sponsored by Intel Security
WHITE PAPER: Discover how to streamline security operations using next-generation endpoint security. Learn about these new tools built for centralization, consolidation and integration that'll help you prevent advanced malware from infecting your endpoints and crippling your organization.
Posted: 09 Dec 2016 | Published: 01 Oct 2016

Intel Security

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Team's Time and Talent
sponsored by Intel Security
WHITE PAPER: In this white paper, learn about a program that takes your threat management protocols from a reactive to a proactive, while reducing complexity and improving operational effectiveness. Access now and discover how you can integrate separate security procedures, automate threat warnings, increase security accuracy with behavioral analytics, and more
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Intel Security

Not Today Zero-Day
sponsored by Intel Security
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

Neutralize Threats with a Collaborative Security Fabric
sponsored by Intel Security
WHITE PAPER: Discover how to get ahead of today's advanced threats and remediate attacks in a timely manner. Manage security operations faster by integrating all defenses across the threat lifecycle into a single collaborative fabric, enabling your organization to make smarter, more efficient security decisions.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

RANSOMWARE Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: This informative white paper teaches you the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

8 Cloud Adoption Best Practices to Ensure Compliance
sponsored by Blue Coat Systems
WHITE PAPER: Learn 8 best practices to ensure compliance when adopting cloud apps and services. Access now to avoid being the next company to lose its way under the sway of Shadow IT.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Blue Coat Systems

Defense-In-Depth with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.

7 Steps to Take Charge of Your Cloud Strategy
sponsored by Blue Coat Systems
WHITE PAPER: Discover 7 actions that IT departments can do to take back their organizations from shadow IT and ensure they are not leaving themselves vulnerable to attack. Access now to gain a blow-by-blow plan to take charge of your enterprise's cloud strategy and not let shadow IT slip through the cracks.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Blue Coat Systems

IT Decision Maker's Cybersecurity Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: This 2016 survey of 1,399 IT decision makers (ITDMs) highlights the shared concerns of new vulnerabilities and security challenges spread across EMEA, APAC and Latin America. Learn how present security infrastructures have struggled to contend with the realities of an increasingly hostile digital world.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: Discover the benefits of proper firewall policy for your organization. Learn the main causes of firewall policy mistakes, which include excessive access, ineffective change management, lack of aging strategy, etc., and how to clean up your current firewall management processes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Quantifying the Value of Firewall Management
sponsored by FireMon
WHITE PAPER: In this research report, Aberdeen Group examined more than 13,000 current network firewall installations. Uncover how to reduce the total annualized business impact of managing firewalls without reducing the protection afforded by them.
Posted: 07 Dec 2016 | Published: 31 Oct 2016

FireMon

Turning Data Protection into a Game Changer for MSPs
sponsored by LogicNow
WHITE PAPER: Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogicNow

Designing an IAM Program Optimized for Your Business
sponsored by IBM
WHITE PAPER: A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

IBM

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

Are You Leaving the Door Open for Cyber Threats?
sponsored by Palo Alto Networks
WHITE PAPER: In this exclusive e-guide, learn how businesses can eliminate security boundaries and develop a resilient defense posture against readily-advancing threats. Read on to uncover how to choose the right firewall, enable steadfast security within virtually all type of apps, and more.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

Palo Alto Networks

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

HID

Important Modern Trends in Digital Banking
sponsored by HID
WHITE PAPER: Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

HID

The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM). Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR).
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID

Guide & Checklist to Container Security
sponsored by NeuVector
WHITE PAPER: This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

NeuVector

Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

A CIO’s Guide for Reducing Security Anxiety
sponsored by BitSight
WHITE PAPER: Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

BitSight
1 - 25 of 692 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement