IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1100 Matches Previous Page  |  Next Page
How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


Understanding the Security Leaders' Plight
sponsored by Dell SecureWorks
WHITE PAPER: When business leaders and security pros aren't communicating with each other, breaches can happen. Learn the 13 areas of IT security where cooperation between both teams is essential.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Dell SecureWorks

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 17 Jul 2017 | Published: 28 Apr 2017

Microsoft

Computer Weekly – 18 July 2017: Airbus secures critical infrastructure
sponsored by ComputerWeekly.com
EZINE: This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

CW ASEAN – July 2017: Be alert to threats
sponsored by ComputerWeekly.com
EZINE: With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

CW ANZ – July 2017: Cyber security plan bears fruit
sponsored by ComputerWeekly.com
EZINE: Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

Deliver Agile Security for the Cloud
sponsored by TrendMicro
WHITE PAPER: Cloud adoption is accelerating rapidly – is your security flexible enough to keep up? Explore an agile security strategy that can seamlessly integrate with cloud services and management tools to prevent data breaches, reduce costs, and more.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

Protecting Your Servers in the Cloud Era
sponsored by TrendMicro
WHITE PAPER: While virtualization and cloud computing can help your organization achieve significant savings while improving business agility, security in these new environments can be a challenge. Explore how you can protect your servers in the cloud age.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

modusCloud Email Security URL Defense
sponsored by Vircom
RESOURCE: Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Vircom

Security Monitoring Solved: An Expert Path to Clairvoyant Defense
sponsored by IBM
VIRTUAL ENVIRONMENT: Security monitoring is essential for staying ahead of the threat landscape. In this exclusive webinar featuring Forrester Research, uncover the criteria for evaluating vendors, the benefits of integrated security platforms and much more.
Posted: 06 Jul 2017 | Premiered: 05 Jul 2017

IBM

The Next Security Frontier: Automation, Things and Intelligent Machines
sponsored by IBM
VIRTUAL ENVIRONMENT: How can you effectively match the progress of emerging threats even within the newest, most promising areas of security, such as AI and DevSecOps? Register for this virtual conference taking place on June 27th 2017, 8:15am – 5:00pm EDT, and get the answers you're looking for.
Posted: 06 Jul 2017 | Premiered: 27 Jun 2017

IBM

A Ranking of Today's Endpoint Protection Platforms
sponsored by Sentinel Labs, Inc.
CASE STUDY: Open this Gartner Magic Quadrant report to get a clear comparison of how 22 endpoint protection platform providers stack up, as well as the strengths of each individual offering, and some cautions to be aware of so that you can be fully informed when making your purchasing decision.
Posted: 06 Jul 2017 | Published: 30 Jan 2017

Sentinel Labs, Inc.

Identify, Connect, and Protect Mobile and IoT at the Edge
sponsored by Aruba Networks
WHITE PAPER: Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Aruba Networks

Leveraging Multi-factor Authentication to Power Protection
sponsored by Centrify Corporation
WHITE PAPER: According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

Your In-Depth 2017 Cybersecurity Report
sponsored by Comstor
RESEARCH CONTENT: Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Comstor

The Impact of Data Breaches on Reputation and Share Value
sponsored by Centrify Corporation
RESEARCH CONTENT: Discover how IT practitioners view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.
Posted: 28 Jun 2017 | Published: 31 May 2017

Centrify Corporation

Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication
sponsored by Centrify Corporation
PRODUCT DEMO: Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Stop The Breach: Reduce The Likelihood Of An Attack Through An IAM Maturity Model
sponsored by Centrify Corporation
RESEARCH CONTENT: Forrester Research investigated the connection between increased adoption of identity and access management (IAM) best practices and reducing the likelihood of experiencing a security breach. Uncover their key findings to learn more about the efficacy of different IAM approaches and technologies.
Posted: 28 Jun 2017 | Published: 28 Feb 2017

Centrify Corporation

Public Employees' Retirement System Increases Network Visibility and Streamlines Security
sponsored by Gigamon
CASE STUDY: Discover how Public Employees' Retirement System enabled full visibility into their entire network and bolstered their security posture. Find out how they enabled consistent access to key information, improved threat management, enhanced network security, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Gigamon

Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting
sponsored by Gigamon
CASE STUDY: Discover how Vela Trading Technologies bolstered their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Gigamon

The Internet of Things: Posing Security Threats and Delivering Beyond Expectations
sponsored by Aruba Networks
WHITE PAPER: Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.
Posted: 23 Jun 2017 | Published: 31 Mar 2017

Aruba Networks

See What Matters: Closing Gaps in Network Visibility
sponsored by Gigamon
RESOURCE: Explore some of the top reasons why IT and security pros struggle to drive deep visibility across their networks and uncover strategies for closing critical gaps in network security.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon
1 - 25 of 1100 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement