IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
26 - 50 of 627 Matches Previous Page  |  Next Page
Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

How Should You Secure Office 365?
sponsored by Proofpoint, Inc.
WHITE PAPER: If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Cyber Ransom Survival Guide
sponsored by Radware
WHITE PAPER: The following resource offers a concise overview of ransomware -- including the current threat landscape, who's likely to be targeted, and the marketplace and tools fueling the trend. Access now and you'll also learn about questions you need to ask and next steps you need to take to safeguard your organization.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Radware

3 Steps to Getting Data Access Governance off Your To Do List
sponsored by STEALTHbits
WHITE PAPER: Data Access Governance (DAG) has been that to-do item IT Security has had for years, but they just kept pushing it aside for other goals. Today, however, there are strategies which can make DAG more approachable. In this free White Paper we are going to break DAG down into 3 steps that you can use to finally check this big one off your list.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Build a Data Access Governance Program to Control Unstructured Data
sponsored by STEALTHbits
WHITE PAPER: Following this 5 step plan will help ensure your organization has its data secured. By the end, you will know how to survey all your organization's data, focus attention where it matters most, get the right stakeholders involved, review and remediate access, and arrive at a working security model to meet both security and compliance needs.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

BMC

314 Day Battle Plan - The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Enabling The Industrial Internet Through Software Assurance
sponsored by Synopsys
WHITE PAPER: Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.
Posted: 08 Sep 2016 | Published: 01 Aug 2016


How One SIEM Strategy Stacks Up
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

LogRhythm, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
WHITE PAPER: Learn what IT pros are saying about Microsoft Azure and how it handles identity and access management, network security, data protection, and more. Discover how to gain insight on how your existing environment maps to potential public cloud offerings.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

A New Security Approach for Governments: Micro-Segmentation
sponsored by Unisys
WHITE PAPER: Explore the power of a new security strategy, micro-segmentation. Learn now about the components of this strategy and how they address data protection challenges for today's governments.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Unisys

Combating financial crime: The increasing importance of financial crimes intelligence units in banking
sponsored by SAS
WHITE PAPER: This white paper assesses how aware banks in Europe and North America are of FCIUs and what measures they have been taking to be more prepared for full implementation of their own FCIU. Understand the importance of banks' FCIUs and potential central intelligence services will offer to the banking industry and to crime prevention.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

UBM Dark Reading: Close the Detection Deficit with Security Analytics
sponsored by SAS
WHITE PAPER: Discover how to collect and correlate data from multiple sources, separate relevant data from irrelevant, and apply context to the data to extract meaningful value from data analysis. Mitigate threats faster than ever and learn the 5 essential characteristics of a security analytics solution.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

Customize Email Security in a Private Cloud
sponsored by Intermedia
WHITE PAPER: Learn what managed public cloud, private cloud and hybrid cloud models can do for your organization's email security – as well as the criteria for choosing the one that's right for you. Access now to specifically uncover the benefits of a Dedicated Hosted Exchange.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Intermedia

Faster Payments: Help Detect and Prevent Fraud While Speeding Up Financial Processing Times
sponsored by IBM
WHITE PAPER: Discover how faster payment processing can provide cybercriminals a quick getaway vehicle and how you can adapt your fraud detection processes for this new era. Learn how counties like the UK, Singapore, Nigeria, and others have near-instantaneous banking and have learned over the years how to combat the threat of fraud.
Posted: 02 Sep 2016 | Published: 31 Jul 2016

IBM

Incident Response Capabilities in 2016
sponsored by LogRhythm, Inc.
WHITE PAPER: As the attacker's landscape has changed, organizations have started to respond and are realizing they must respond quickly. Discover how the results of a 2016 incident response survey show a need for more efficient incident response teams, and learn what you can do to improve yours.
Posted: 01 Sep 2016 | Published: 30 Jun 2016

LogRhythm, Inc.

How to Secure Cloud Applications & Services
sponsored by Blue Coat Systems
WHITE PAPER: Discover the major points of an enterprise's transition to the cloud, and what they can do to make it a profitable and secure one. Learn about the shift in workloads, the evolution in the security stack, the challenges of deep visibility, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

Safely Adopting Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to shore up your security measures to cover the gaps left by Office 365. Learn not only about the gaps themselves, but also what their ramifications are on a wider scale, how to take a wide angle viewpoint on the issues, how to stay compliant, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

2016 Cost of Data Breach Study United States
sponsored by IBM
WHITE PAPER: This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

Worried About Mobile Security? You Should be
sponsored by IBM
WHITE PAPER: Learn the importance, growth, and lethal significance of mobile security threats. Uncover why malware has exploded out of its infancy with a vengeance, how built-in security controls from vendors won't protect mobile devices, why fraudsters can effectively "fly under the radar", and more.
Posted: 01 Sep 2016 | Published: 31 Jul 2016

IBM
26 - 50 of 627 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement