IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
51 - 75 of 680 Matches Previous Page  |  Next Page
GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec & Blue Coat Systems

GDPR Compliance Risks on Websites
sponsored by The Media Trust
WHITE PAPER: Discover 5 steps to prepare your business for the General Data Protection Regulation (GDPR) which goes into effect in May 2018. Uncover how to create a risk management and GDPR compliance program for your business.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

The Media Trust

Vulnerability Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER: In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.
Posted: 07 Jun 2017 | Published: 07 Jun 2017


Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

How Hybrid Cloud Has Transformed Security of the Data Center
sponsored by TrendMicro
WHITE PAPER: Learn how server security has evolved in the face of cloud computing, and what it takes to secure your company's servers today.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover how to secure today's servers by examining the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

TrendMicro

Cybersecurity Dissonance: Security Gap Between Perception and Reality
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: To meet their security needs, many SMBs are working with a security operations center (SOC). Learn how a SOC can help meet your protection needs, and discover other key security info in this resource.
Posted: 01 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

Ensure Success for Your IAM Project
sponsored by One Identity
WHITE PAPER: Discover how to achieve success with your IAM project. Learn about the 3 pillars of IAM functionality, 3 major reasons why IAM projects fail, how your peers struggle with IAM, and more.
Posted: 30 May 2017 | Published: 30 May 2017

One Identity

Securing the Evolving Enterprise Network – Inside and Out
sponsored by Aruba Networks
WHITE PAPER: This ESG white paper delves into the current state of network security and the complexities of working with mobile, cloud, IoT, and digital transformation. Uncover key lessons about "closed-loop" network security with visibility into all devices, centralized policy management, and user and entity behavior analytics.
Posted: 30 May 2017 | Published: 30 Apr 2017

Aruba Networks

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Mobile and Cloud Security: MobileIron vs Microsoft Intune
sponsored by MobileIron
WHITE PAPER: This resource highlights the key differences between MobileIron and Microsoft's Intune. Discover how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 26 May 2017 | Published: 26 May 2017

MobileIron

Implementing Effective Incident Response
sponsored by Rsam
WHITE PAPER: Uncover how to more efficiently and more effectively respond to incidents with an incident response platform.
Posted: 26 May 2017 | Published: 26 May 2017

Rsam

The Promise and Risk of the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: Discover how operational tech like centrifuges and electrical grids can ensure robust security with IT/OT convergence efforts, create a foundation for greater cost and process efficiencies, gain a competitive edge derived from harnessing the power of the industrial Internet of Things, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

From Spreadsheets To Software: The Intelligent Way To Manage Third-Party Risk
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Learn about forward-thinking systems that make third-party risk management a simpler and more efficient process.
Posted: 02 Jun 2017 | Published: 30 Dec 2016

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks
51 - 75 of 680 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement