IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
26 - 50 of 480 Matches Previous Page  |  Next Page
How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Virtualization: Superior, Flexible and Efficient Protection
sponsored by TechData Corporation
WHITE PAPER: Access this white paper and learn how to protect for your virtual servers and desktop environments. Find out how your organization can achieve outstanding protection, better performance and greater efficiency.
Posted: 26 Jan 2016 | Published: 31 Dec 2014

TechData Corporation

Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.
Posted: 26 Jan 2016 | Published: 12 Dec 2013

Digital Guardian

Secure Any Data, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, you will learn how to effectively protect any kind of data. Find out how you can track, audit and manage the policies in real-time and secure your data no matter what device, person, cloud or application it travels to.
Posted: 25 Jan 2016 | Published: 01 Dec 2015

Vera

The C-Suite & Cybersecurity: Six Reasons to Step up Your Security Game This Year
sponsored by AllClear ID
WHITE PAPER: In this white paper, Forrester Research describes the six most significant changes coming to security economics, government policy, the role of business in 2016 and what you should do about them.
Posted: 25 Jan 2016 | Published: 07 Dec 2015

AllClear ID

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Client Study: Security Intelligence
sponsored by IBM
WHITE PAPER: This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.
Posted: 25 Jan 2016 | Published: 31 Jul 2015

IBM

Secure the data that powers your business with IBM Security Guardium
sponsored by IBM
WHITE PAPER: This white paper will show you how to adpot a proactive, holisitc approach to protecting sensitive data across all platforms.
Posted: 25 Jan 2016 | Published: 12 Aug 2015

IBM

FedRAMP and the Department of Defense's Security Requirements Guide
sponsored by Coalfire
WHITE PAPER: This white paper reviews FedRAMP, the Security Requirements Guide (SRG) and provides guidance for cloud service providers that are interested in upgrading to the new baseline.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Coalfire

Project Planning for FedRAMP
sponsored by Coalfire
WHITE PAPER: Access this white paper and learn how FedRAMP is intended to improve the security of the cloud implementations that support the operation of the federal government.
Posted: 25 Jan 2016 | Published: 15 Jul 2015

Coalfire

Top 6 Dangers of Not Inspecting SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Encryption can improve message confidentiality and integrity but it may also mask hackers' activities. Access this white paper to learn six additional dangers of not inspecting SSL traffic, and what your business can do to expose threats.
Posted: 25 Jan 2016 | Published: 21 Jan 2016

A10 Networks

5 Ways Vera Makes Office 365 More Secure
sponsored by Vera
WHITE PAPER: In this white paper, learn how you can protect every document your team creates, without sacrificing the simple, consistent user experience you count on.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Vera

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

5 Ways to Extend Security Beyond Dropbox
sponsored by Vera
WHITE PAPER: Access this white paper to discover how you can better protect your files in Dropbox. Learn to protect, secure and track all you confidential and sensitive content.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

Vera

Securing the Enterprise with an ADC
sponsored by A10 Networks
WHITE PAPER: To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

A10 Networks

Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015

IBM

Complexity and Data Growth Driving Small and Medium-Sized Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Continue reading this white paper to learn how different businesses are utilizing a variety of strategies to manage their cloud, virtual and physical servers. Discover how to manage your hybrid IT environment efficiently.
Posted: 25 Jan 2016 | Published: 18 Jun 2014

Acronis

Infographic: Top Reasons You Need A High Performance ADC
sponsored by A10 Networks
WHITE PAPER: In a world where 35% of data breaches consist of web attacks, you need a reliable security strategy. Access this infographic to learn what's at stake for network security, and how you can mitigate these issues with four key capabilities.
Posted: 25 Jan 2016 | Published: 20 Nov 2014

A10 Networks

Build a Privacy Organization to Manage Customer Data Effectively
sponsored by AllClear ID
WHITE PAPER: In this white paper, Forrester Research walks you through how to effectively manage, organize and protect customer data.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

AllClear ID

Success That Scales: Delivering Security Intelligence for Organizations of All Sizes
sponsored by IBM
WHITE PAPER: This white paper explains how an integrated security intelligence platform with scalable capabilities, allowing enterprises to stay a step ahead of security threats. Read on to learn how this platform can enable you to scale out and up and deploy new capabilities such as integrated risk management, vulnerability management, and incident forensics.
Posted: 22 Jan 2016 | Published: 31 Oct 2014

IBM

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

Is Your Team Prepared for a Data Breach?
sponsored by AllClear ID
WHITE PAPER: In this white paper, you will learn how to properly prepare for and respond to any data breaches your enterprise might experience.
Posted: 22 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Protect Against Evolving DDoS Threats: The Case for Hybrid
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will discover how you can achieve assurance and protect your organization now and into the future. Learn how to choose a solution that will help you defend and block attacks as well as be fully embraced by your operations team.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

F5 Networks

Telenor Gains Greater Insight for Incident Investigation, Troubleshooting and Improved Security
sponsored by Splunk
WHITE PAPER: In this white paper, you will learn how you can gain visibility and operational insight to keep your networks running at peak performance. Discover more about your network infrastructure and its potential for business.
Posted: 21 Jan 2016 | Published: 06 Jan 2016

Splunk
26 - 50 of 480 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement