IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureWhite Papers (View All Report Types)
151 - 175 of 404 Matches Previous Page  | Next Page
Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

The Promises and Pitfalls of BYOD
sponsored by Dell Software
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Dell Software

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

How to Reduce the Cost and Complexity of Two Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: Access this resource to explore key practices for combatting complexity and high cost challenges with two-factor authentication.
Posted: 03 Feb 2014 | Published: 30 Sep 2012

Celestix Networks

Regain Visibility and Control with Cost-effective Next-generation Security
sponsored by Palo Alto Networks
WHITE PAPER: This resource overviews a next-generation security platform that offers clear visibility and improved control over users, applications, and content. Click now to see how 3 businesses fared after deploying this solution, including immense cost and operation reduction benefits.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Palo Alto Networks

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

Know the big three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines you how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

Designing a defense for mobile application
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper you will learn about the various considerations for defending mobile applications—from the mobile application architecture itself to the myriad testing technologies.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Hewlett-Packard Company

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 14 Jan 2014 | Published: 14 Jan 2014

Hewlett-Packard Company

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
sponsored by Cisco
WHITE PAPER: This whitepaper details the trouble modern firewalls have with protecting your data from modern threats and offers a next-generation solution for your organization.
Posted: 09 Jan 2014 | Published: 15 May 2013

Cisco

Single Sign On and Web Access Control Made Easy
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a unified, integrated identity and access management (IAM) system that uses a service oriented architecture (SOA) stack feature to simplify web access security for on- and off-premise applications.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

OpenIAM

Taking your enterprise mobile:  Executive checklist
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment.
Posted: 02 Jan 2014 | Published: 02 Jan 2014

Citrix

Embracing BYOD through secure app and data delivery EMM
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses an enterprise mobility management (EMM) solution that empowers consumerization and bring your own device (BYOD) programs through secure application and data delivery allowing for a diverse, productive and efficient mobile environment.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix

Integrating Microsoft Technologies with an Identity and Access Management Solution
sponsored by OpenIAM
WHITE PAPER: In this whitepaper, learn how one comprehensive identity and access management (IAM) solution can be easily integrated with your existing Microsoft technologies, as well as non-Microsoft tools.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

OpenIAM

Delivering Success that Scales with the Largest Enterprises
sponsored by IBM
WHITE PAPER: Securing your IT system can be complex and expensive, but many businesses are implementing comprehensive security solutions to collect and monitor their high data volumes. This guide highlights a powerful security intelligence platform that can save your IT department time and money.
Posted: 26 Dec 2013 | Published: 31 Jan 2013

IBM

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: This valuable resource highlights the renewed focus on firewalls to improve security given the increasing complexities in network architectures. Click now to explore next-generation firewalls, and 10 things that they must do to protect your organization.
Posted: 24 Dec 2013 | Published: 19 Aug 2013

Palo Alto Networks

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Meeting Backup and Archive Challenges - Today and Tomorrow
sponsored by Fujitsu
WHITE PAPER: This exclusive paper discusses the backup and recovery challenges that organizations today face, focusing on how you can overcome common data management and archiving challenges to ensure that, in the event of disaster, your critical data and services are up and running as fast as possible.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Fujitsu

Cisco Mobile Security Survey: Research Highlights
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Cisco Systems, Inc.

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
Posted: 09 Jan 2014 | Published: 20 Oct 2011

SafeNet Asia Ltd

Taming the Integration Nightmares of a 1,000 App Enterprise
sponsored by Palo Alto Networks
WHITE PAPER: Access this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
Posted: 26 Dec 2013 | Published: 28 Jan 2014

Palo Alto Networks
151 - 175 of 404 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement