IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
76 - 100 of 766 Matches Previous Page  |  Next Page
How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 01 May 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Office 365: This the ROI You Were Expecting?
sponsored by Microsoft
WHITE PAPER: In this Forrester study learn the total economic impact of Microsoft Office 365 for small and midsize businesses, and give you a sense of what kind of ROI to expect when deploying Office 365.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Office 365: Is the ROI worth it?
sponsored by Microsoft
WHITE PAPER: In this Forrester report discover the ROI of Office 365, and better understand the benefits, costs, and risks associated with an Office 365 implementation within a mid-sized company.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Create Your Cloud Security Technology Strategy And Road Map
sponsored by Microsoft
WHITE PAPER: Forrester Research warns that "your current 'we control everything' security strategy does not apply to the cloud". With such a fundamental shift, how can CISOs approach the issue? Access this Forrester report to discover how to secure your enterprise on the cloud.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

How to Gain Unified Endpoint Management in Your Mobile Computing Network
sponsored by IBM
WHITE PAPER: Given the importance of mobile computing in keeping businesses competitive, it's more important than ever that organizations strike the appropriate balance between security and productivity. Access this whitepaper to uncover how to act upon security best practices, score your business' security infrastructure and more.
Posted: 28 Apr 2017 | Published: 31 Mar 2017

IBM

How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

The Six Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Uncover the 6 essential capabilities of an analytics-driven SIEM. Discover how having these capabilities will allow your enterprise to monitor threats in real time and respond quickly to incidents, minimize risks from insider threats or accidental compromise, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Splunk

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

ITAD to Strengthen Data Protection
sponsored by Iron Mountain
WHITE PAPER: IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Iron Mountain

Gov't Agencies: Remain Secure and Compliant with 5 Considerations
sponsored by TechData - Brother
WHITE PAPER: Discover 5 considerations when looking to remain secure and compliant in today's threat environment.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

TechData - Brother

DevSecOps: How to Seamlessly Integrate Security Into DevOps
sponsored by Sonatype
WHITE PAPER: In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, all while ensuring security.
Posted: 25 Apr 2017 | Published: 30 Sep 2016

Sonatype

Perimeter Security: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Discover how to rethink, re-invent, and re-architect your IAM strategies. Access this white paper to learn how to ensure secure authentication for all apps and address the inherent risks associated with decentralized access controls and identity sprawl.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

F5 Networks

BitLocker Toolkit
sponsored by WinMagic
WHITE PAPER: Access this white paper to discover how your enterprise can optimize its use of BitLocker to improve its encryption and identity security.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

WinMagic

Identity Management: The Key to Stopping Breaches
sponsored by SailPoint Technologies
WHITE PAPER: With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SailPoint Technologies

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended network and application practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Achieving Optimal IFRS 9 Compliance
sponsored by SAS
WHITE PAPER: Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SAS

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

IAM: Your Tool to Defeating Data Breaches
sponsored by SailPoint Technologies
WHITE PAPER: A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

Security Report: Transaction Monitoring Optimization
sponsored by SAS
WHITE PAPER: Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.
Posted: 21 Apr 2017 | Published: 31 Dec 2016

SAS

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation
sponsored by SAS
WHITE PAPER: Failing to comply with the GDPR can result in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SAS

Key Considerations in Deploying an SSL Solution
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn what you need to know about Secure Sockets Layer (SSL) and how to construct your security strategy.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks
76 - 100 of 766 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement