IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
126 - 150 of 692 Matches Previous Page  |  Next Page
DDoS: A Clear and Present Danger
sponsored by A10 Networks
WHITE PAPER: Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Guide to PCI Compliance in the Cloud
sponsored by Armor
WHITE PAPER: Discover how to achieve complete control of your IT environment when you pursue PCI DSS compliance on your DIY cloud security environment. Learn the basics of compensating controls, gain an understanding of the latest version of PCI DSS, and more.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Armor

Ultimate Guide to Multi-Vector DDoS Protection
sponsored by A10 Networks
WHITE PAPER: Learn everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of a strong multi-vector DDoS attack protection solution.
Posted: 21 Oct 2016 | Published: 30 Sep 2016

A10 Networks

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

IBM

10 Critical Requirements for Optimizing Application Delivery
sponsored by A10 Networks
WHITE PAPER: Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

A10 Networks

Fragmentation: The "Silent Killer" of Your Security Management Program
sponsored by ThreatConnect
WHITE PAPER: Look at the issues caused by security fragmentation and uncover a path towards enhanced security through better unity, one that cuts the detection deficit with a cohesive, intelligent defense.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

ThreatConnect

The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector
sponsored by A10 Networks
WHITE PAPER: In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Protecting and Empowering your Connected Organization
sponsored by Microsoft
WHITE PAPER: This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Microsoft

Stop Malware Before It Stops You
sponsored by Trustwave
WHITE PAPER: Discover how to detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.
Posted: 18 Oct 2016 | Published: 31 Dec 2013

Trustwave

Don't Guess. Test. Uncover Your Security Vulnerabilities
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Leverage Real-Time Protection from Advanced Web Threats
sponsored by Trustwave
WHITE PAPER: Discover a real-time web protection strategy that can target modern malware threats. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Enhance AWS Security with Splunk Solutions
sponsored by Splunk
WHITE PAPER: In this white paper, uncover why security should not be amongst chief concerns when adopting cloud services. Read on to find out how when paired with the right analytics tool, cloud services can be the foundation for a relentless defense against the future threat landscape.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

Splunk

Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Today, almost every distributed enterprise demands fast, transparent access to critical information. And as the data travels fast, so too must protection around it. Discover a tightly integrated infrastructure – access, networking and security - capable of meeting these demands without compromising performance or security.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

MSSP Checklist
sponsored by AlienVault
WHITE PAPER: Discover how to become the best MSSP you can be through this checklist. It's advised that you modify it to fit your individual work style. The services you offer and your experience will influence the creation and the ongoing edits of this checklist.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

AlienVault

5 Ways to Secure Your Mobile Endpoints
sponsored by Commvault
WHITE PAPER: Organizations know they should secure their users' mobile endpoint devices. But how? Discover the five crucial security features your organization must implement to confidently secure mobile devices and protect against all types of thieves.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

Commvault

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Protecting Critical Assets from Unauthorized Access
sponsored by IBM
WHITE PAPER: Learn how identity and access management is at the heart of every cybersecurity strategy. Uncover how to safeguard mobile, cloud and social access; prevent advanced insider threats; simplify cloud integrations and identity silos; and more.
Posted: 12 Oct 2016 | Published: 31 Jul 2016

IBM

Why NGFWs Are Becoming the New Standard in Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.
Posted: 10 Oct 2016 | Published: 31 Jul 2016

LogRhythm, Inc.

Five Important Truths About Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper discover 5 steps to meeting digital workspace security objectives, and taking a people-centric approach to security that doesn't come at the cost of productivity or user experience.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

RES Software

The Three Essential Elements of Next-Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: With an overabundance of security solutions being touted as "next gen," how do you know what really is an innovative endpoint protection product? Discover an explanation of the essential elements of next-gen endpoint protection, a list of the top questions to ask potential vendors, and more.
Posted: 07 Oct 2016 | Published: 07 Oct 2016

CrowdStrike

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

4 Ways Neustar Strengthens your DNS Security
sponsored by Neustar
WHITE PAPER: The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.
Posted: 10 Oct 2016 | Published: 31 Dec 2015

Neustar

No Downtime, No Problem. Silverstring Protects Customers and Their Data
sponsored by Neustar
WHITE PAPER: Discover how Silverstring protects their customers' mounds of data and keep their site up and running without the risk of downtime. With top notch performance, availability and security, Silverstring rests assured that they can meet any IT challenge they face moving forward.
Posted: 10 Oct 2016 | Published: 30 Sep 2016

Neustar
126 - 150 of 692 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement