IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
76 - 100 of 623 Matches Previous Page  |  Next Page
What Constitutes Effective Security Awareness Training?
sponsored by KnowBe4
WHITE PAPER: Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Firewall Sprawl: Four Security Gaps Exposed
sponsored by FireMon
WHITE PAPER: Discover the truth surrounding next-generation firewalls (NGFWs). Learn the four firewall security gaps that could be putting your organization at risk, and the proper management processes to patch those gaps.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

FireMon

Redefining Next-generation Endpoint Security Solutions
sponsored by Intel Security
WHITE PAPER: Discover how to streamline security operations using next-generation endpoint security. Learn about new tools built for centralization, consolidation and integration that can help you prevent advanced malware from infecting your endpoints and crippling your organization.
Posted: 09 Dec 2016 | Published: 01 Oct 2016

Intel Security

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Team's Time and Talent
sponsored by Intel Security
WHITE PAPER: In this white paper, learn how to take your threat management protocols from reactive to proactive, while reducing complexity and improving operational effectiveness. Access now and discover how you can integrate separate security procedures, automate threat warnings, increase security accuracy with behavioral analytics, and more.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Intel Security

Block Zero-Day Threats Before They Hit Endpoints
sponsored by Intel Security
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

Neutralize Threats with a Collaborative Security Fabric
sponsored by Intel Security
WHITE PAPER: Discover how to get ahead of today's advanced threats and remediate attacks in a timely manner. Manage security operations faster by integrating all defenses across the threat lifecycle into a single collaborative fabric, enabling your organization to make smarter, more efficient security decisions.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

8 Cloud Adoption Best Practices to Ensure Compliance
sponsored by Blue Coat Systems
WHITE PAPER: Learn 8 best practices to ensure compliance when adopting cloud apps and services. Access now to avoid being the next company to lose its way under the sway of shadow IT.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Blue Coat Systems

7 Steps to Take Charge of Your Cloud Strategy
sponsored by Blue Coat Systems
WHITE PAPER: Discover 7 actions that IT departments can adopt to take charge of their cloud strategy and take back their organizations from shadow IT to ensure they are not leaving themselves vulnerable to attack.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Blue Coat Systems

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Quantifying the Value of Firewall Management
sponsored by FireMon
WHITE PAPER: In this research report, Aberdeen Group examined more than 13,000 current network firewall installations. Uncover how to reduce the total annualized business impact of managing firewalls without reducing the protection afforded by them.
Posted: 07 Dec 2016 | Published: 31 Oct 2016

FireMon

An MSP Guide to Selling IT Security
sponsored by Solarwinds MSP
WHITE PAPER: Discover a roadmap to enhance your MSP offering with security services, why you should take a layered security approach, and 5 tips for selling IT security. Access now and unveil how to expand upon your existing toolkit and evolve from MSP to MSSP.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Solarwinds MSP

Designing an IAM Program Optimized for Your Business
sponsored by IBM
WHITE PAPER: A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

IBM

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Discover why and how IT security strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

Guide & Checklist to Container Security
sponsored by NeuVector
WHITE PAPER: This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

NeuVector

Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: In this white paper get a handle on what a CASB can offer your enterprise, and how to best leverage the benefits afforded by them.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

How MDM Software Exposes Your Personal Data
sponsored by BitGlass
WHITE PAPER: Mobile device management software is widely used in organizations embracing the BYOD movement, but how much does it truly monitor? In this case study, several willing participants had MDM software installed on their personal devices. The outcome? Access this case study to find out.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Top 5 SIEM Challenges for the Midmarket
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Arctic Wolf Networks, Inc.

Arapahoe House Secures BYOD
sponsored by BitGlass
WHITE PAPER: In this case study examine how Arapahoe House, a non-profit & leading provider of substance use disorder treatment in Colorado, deployed a security policy for their BYOD users that allowed them to selectively wipe BYOD data, streamline provisioning and de-provisioning, gain visibility into all BYOD usage, and more.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

BitGlass

Reduce Open Source Security Risk: Strategies, Tactics and Tools
sponsored by Rogue Wave Software
WHITE PAPER: Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Rogue Wave Software

Managed Detection and Response
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Remove the burden or choosing the right security tools. Discover how to achieve best-in-class Managed Detection and Response with your limited budget.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM
76 - 100 of 623 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement