IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureWhite Papers (View All Report Types)
126 - 150 of 400 Matches Previous Page  | Next Page
Does Application Security Pay?
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce application vulnerabilities, speed recovery time, and minimize delays. Read on to learn more.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

The 2014 Endpoint Security Buyers Guide
sponsored by Lumension
WHITE PAPER: This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology.
Posted: 21 Feb 2014 | Published: 16 Aug 2013

Lumension

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER: Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Imperva

NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Security in a Faster Forward World
sponsored by Akamai Technologies
WHITE PAPER: This informative white paper explains why legacy security solutions such as DDoS scrubbing services are no longer effective, and to stay secure in today's world organizations should strengthen their front lines with a Web site protection service. Read on to find a security solution fit for your needs that will keep you safe now and into the future.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

Akamai Technologies

IBM Acquires Fibrelink to Bloster its Mobile First Portfolio
sponsored by IBM
WHITE PAPER: This informative white paper discusses how the mobile management trend is shifting away from simply "managing the device" and moving instead towards all-encompassing solutions suites that provide management for applications, data, analytics, and security.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

IBM

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Imperva
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This resource offers a Web application firewall solution that addresses the Open Web Application Security Project (OWASP) Top 10 security risks.
Posted: 19 Feb 2014 | Published: 31 Dec 2013

Imperva

Keeping Distributed Endpoints Safe and Secure
sponsored by IBM
WHITE PAPER: In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
Posted: 18 Feb 2014 | Published: 30 Jun 2012

IBM

Managing Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data.
Posted: 18 Feb 2014 | Published: 31 Dec 2011

IBM

Making Smarter Mobile Access Decisions
sponsored by Dell Software
WHITE PAPER: Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Dell Software

How Much Security do you Really Need?
sponsored by IBM
WHITE PAPER: This resource is an essential guide for SMBs looking to make the right investments in security to ensure optimum protection.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

IBM

Twelve Recommendations For Your Security Program In 2014
sponsored by TITUS
WHITE PAPER: This Forrester Research, Inc. report highlights how the IT environment requires a more customer-oriented business, and 4 ways that IT security teams are now responsible for driving this initiative. Click now for 12 security strategy best practices designed to last.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

TITUS

Why Leaks Matter
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Lumeta Corporation

Top 3 Undiscovered Vulnerabilities IPsonar Finds on a First Scan
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper discusses a network discovery solution that fills a gap in situational awareness, discovering and providing data on your entire network and allowing you to find, identify, and catalog hundreds of thousands of devices while securing your infrastructure.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Lumeta Corporation

How to Align your Security Needs with Business Objectives
sponsored by Hewlett-Packard Limited
WHITE PAPER: This whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
Posted: 12 Feb 2014 | Published: 10 Apr 2013

Hewlett-Packard Limited

Discover and Manage Your Network Perimeter
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper discusses the importance of establishing a network perimeter, examining business trends that change network boundaries, and guiding the use of network perimeters to secure critical data and applications.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Lumeta Corporation

Business Insight: Enabling User Mobility with Enterprise Security Solutions
sponsored by Dell Software
WHITE PAPER: Learn how to enable user mobility through better security. Savvy organizations have embraced the benefits of user mobility, including increased productivity, improved customer relationships and lower costs. This white paper tells how to blend life and work activities like never before – while keeping your company secure.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Dell Software

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

The Promises and Pitfalls of BYOD
sponsored by Dell Software
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Dell Software

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER: This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Acronis

Fortinet's Data Center Solution: Security From the Edge to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security platform that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 14 Feb 2014 | Published: 31 Dec 2013

Fortinet, Inc.

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.
126 - 150 of 400 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement