IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
101 - 125 of 685 Matches Previous Page  |  Next Page
Out of Order! The Risks of Being Out of Compliance
sponsored by Globalscape
WHITE PAPER: Discover common regulations and how compliance risks evolved across the enterprise, the top 6 consequences of failing to comply with industry or government regulations, and the role of data management in helping facilitate or maintain compliance.
Posted: 22 May 2017 | Published: 22 May 2017

Globalscape

When It Comes to Cloud Security, What You Don't Know Can Hurt You
sponsored by evident.io
WHITE PAPER: Access this resource now to learn how to secure your cloud services and get a big-picture view across all of your cloud environments, lower costs, and more.
Posted: 18 May 2017 | Published: 18 May 2017

evident.io

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

Policy Management for IoT, Mobile, and Network Security
sponsored by Aruba Networks
WHITE PAPER: With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.
Posted: 12 May 2017 | Published: 12 May 2017

Aruba Networks

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 11 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany
Posted: 10 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Network Management and Operational Efficiency: How the Right NGFW Makes It Possible
sponsored by Forcepoint
WHITE PAPER: Learn about how you can find a next-gen firewall (NGFW) system that is built to fit the strength and scalability your business needs, with the simplicity and efficiency that you want in this white paper.
Posted: 10 May 2017 | Published: 10 May 2017

Forcepoint

6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Discover a detailed showcase of the 3 steps on the path to building up your organization's application security maturity.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Cybersecurity: Turning Threat Data Into Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn how real-time DNS observations improve the accuracy and response time to cyberattacks and how to use passive DNS to escalate the discovery and accelerate the investigative timeline.
Posted: 08 May 2017 | Published: 08 May 2017

Farsight Security

Not All Machine Learning Is Created Equal
sponsored by Cylance
WHITE PAPER: Discover how to apply machine learning to your organization's endpoint security and achieve unprecedented efficacy rates, minimal consumption of system resources, exceptional attack prevention speed, and more.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Navigating the NY Dep. of Financial Services' Cybersecurity Regulations
sponsored by Veracode, Inc.
WHITE PAPER: Discover the 5 minimum requirements for NYDFS compliant cybersecurity programs, and what it means that these regulations require each company to assess its specific risk profile and design a program that addresses its risks in a "robust" fashion.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Combating the Top 4 Sources of Vulnerabilities
sponsored by Veracode, Inc.
WHITE PAPER: Vulnerability software is leading to security breaches. Learn how to combat the top four sources of application software vulnerabilities.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Strengthen Your Security Posture by Mapping Network Traffic to Users
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores how to leverage a User-ID security platform with next-generation firewall capabilities. Find out how to easily integrate user information into your security infrastructure and with features like user authentication and user-based policy control and reporting.
Posted: 08 May 2017 | Published: 31 Dec 2016

Palo Alto Networks

Rethinking the Approach to Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.
Posted: 04 May 2017 | Published: 10 Feb 2017

Fortinet, Inc.

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany it.
Posted: 03 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 02 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 02 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black
101 - 125 of 685 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement