IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
101 - 125 of 505 Matches Previous Page  |  Next Page
Success That Scales: Delivering Security Intelligence for Organizations of All Sizes
sponsored by IBM
WHITE PAPER: This white paper explains how an integrated security intelligence platform with scalable capabilities, allowing enterprises to stay a step ahead of security threats. Read on to learn how this platform can enable you to scale out and up and deploy new capabilities such as integrated risk management, vulnerability management, and incident forensics.
Posted: 22 Jan 2016 | Published: 31 Oct 2014

IBM

Is Your Team Prepared for a Data Breach?
sponsored by AllClear ID
WHITE PAPER: In this white paper, you will learn how to properly prepare for and respond to any data breaches your enterprise might experience.
Posted: 22 Jan 2016 | Published: 16 Dec 2015

AllClear ID

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Breaking the Cyber Attack Lifecycle
sponsored by Palo Alto Networks
WHITE PAPER: This white paper discusses the modern landscape of cyber insecurity, and how enterprises can deploy a new sophisticated platform for providing network defense. Specifically, you'll find out how to detect and prevent attacks at every stage of the attack lifecycle.
Posted: 10 Dec 2015 | Published: 31 Mar 2015

Palo Alto Networks

Continuous Security and Reliability in Iterative Development
sponsored by evident.io
WHITE PAPER: Access this white paper to understand the new approaches to security required in a continuous deployment environment.
Posted: 20 Nov 2015 | Published: 31 Dec 2014

evident.io

The State of the Virtualized Data Center: Physical and Virtual Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Find out how your network security peers evaluate network security when implementing new technology, and what they look for when choosing tools to support a virtualized environment, in this survey report.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Juniper Networks, Inc.

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Three Ways to Leverage Desktop Virtualization To Reduce the Complexity in Securing Endpoints
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore three ways that desktop virtualization can reduce the time and complexity involved in securing endpoints – while also limiting your risk of data loss from security breaches.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Dell, Inc. and Intel®

Examining File Sync and Sharing Security
sponsored by IntraLinks, Inc
WHITE PAPER: Inside this white paper, find out how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant in the ever changing security landscape.
Posted: 18 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Top 5 IT security trends to watch
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Dynamic Access Control: Beyond Classic NTFS Permissions
sponsored by Global Knowledge
WHITE PAPER: Read this white paper to learn how you can design security groups and folder hierarchies that let you control file system access the way you want with Dynamic Access Control.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Global Knowledge

Holistic Fraud Prevention: Transforming the Customer's Experience
sponsored by IBM
WHITE PAPER: This white paper discusses how you can adopt a new paradigm of fraud prevention that keeps the hackers out and your customers happy.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Top 5 Security Aspects to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: While cloud technology has caught on quickly, moving to the cloud often comes with another set of unforeseen challenges. Find out how today's most pressing cloud security and related operational risks rank among the top concerns for organizations and learn the top five questions every cloud provider must be able to answer and address.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. Find out how you can manage risk effectively so your organization can benefit from mobility and flexwork initiatives.
Posted: 13 Nov 2015 | Published: 30 Jan 2015

Citrix

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Corporation
101 - 125 of 505 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement