IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
76 - 100 of 749 Matches Previous Page  |  Next Page
Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Should security pros rely on sandboxing as their single point of defense? Discover where sandboxing technology stands today, why it fails to meet the needs of organizations, and what's needed for effective malware analysis.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Your Guide to Spotting and Preventing Malware Infection
sponsored by Solarwinds MSP
WHITE PAPER: Learn about the types of attacks facing a typical network and uncover some successful mitigation strategies IT professionals have implemented to protect their networks.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Solarwinds MSP

A Look at How Data Privacy Laws Impact Cloud Adoption in Russia
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy Russian data residency, privacy, and regulation requirements when it comes to the cloud. Discover how to avoid business disruptions by complying with the law.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Next-generation Firewall Platforms the Answer to NGFW Shortcomings?
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall technology has evolved to be an essential cog in the overall cybersecurity machine, but it remains one of a multitude of puzzle pieces needed. In this ESG report uncover the NGFW shortcomings, and how to maximize their efficiency for your organization
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Secure Your Email Against Targeted Phishing Attacks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to ensure your email is protected against phishing attacks. Discover not only what to look for in threats coming in, but also how to tackle sophisticated email security challenges.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

The Ultimate Checklist To Preventing And Fighting Ransomware Attacks
sponsored by Cisco Systems, Inc.
WHITE PAPER: When it comes to battling ransomware, your best offense is a good defense. Is your organization prepared to ward off an attack? Run through these 10 steps to develop, or enhance your existing, ransomware defense strategy.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

How ransomware can hold your business hostage
sponsored by Dell SonicWALL
WHITE PAPER: Delve into the modern malware threat landscape and gain a detailed understanding of how malware targets your company, how it works, why traditional methods fail to protect against it, and how to mitigate your risk.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Dell SonicWALL

3 Steps to Improving Incident Response
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

The new EUsecurityrequirements and you
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

4 Essential Capabilities for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and how to combat today's advanced malware attacks using a combination of 4 techniques.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

Viewpoints and Vendor Comparisons: Access Management and ID Federation
sponsored by IBM
WHITE PAPER: In this market report, learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Also gain rare insight into product ratings, vendor coverage, leaders in the field, and more.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Protect Your Critical Assets with Identity Governance and Intelligence
sponsored by IBM
WHITE PAPER: Learn how integrating policy and governance controls with identity management processes would help your organization understand, control, and make better business decisions related to access and risk.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place
sponsored by Dell SonicWALL
WHITE PAPER: Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Dell SonicWALL

8 Best Practices To Prevent Your Data From Being Held Hostage
sponsored by Dell SonicWALL
WHITE PAPER: Discover 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Dell SonicWALL

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Keep Systems Secure with Best Practices – and Best User Experience – in Mind
sponsored by IBM
WHITE PAPER: IT is in state of crisis, with hundreds of millions of identities stolen annually. Access this resource to better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough for today's security landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

IBM

App Security: Shore up the Weaknesses in Your WAF
sponsored by tCell
WHITE PAPER: Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses. Uncover the top 5 requirements for an application immune system and how to protect your web applications and modernize your security policy to stand firm against today's threats landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

tCell

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. In this 2017 annual threat report discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 tips on how to keep your data safe in the cloud. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Symantec & Blue Coat Systems

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 5 vital cloud data protection questions and answers in this white paper, covering your organization's first steps into migrating to the cloud all the way to dealing with long-term compliance issues.
Posted: 22 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

Putting a Next-Generation Firewall Through Its Paces
sponsored by Forcepoint
WHITE PAPER: See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability, and total cost of ownership.
Posted: 20 Feb 2017 | Published: 31 Dec 2015

Forcepoint

Email Security Threats: Not Just from the Outside
sponsored by Mimecast
WHITE PAPER: Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast
76 - 100 of 749 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement