IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1103 Matches Previous Page  |  Next Page
How to Secure your Network Smarter and Faster
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, learn about Junos Space Security Director to help manage and automate workflows, allowing network administrators to monitor applications and users and remediate security threats faster across all firewalls.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive
sponsored by Juniper Networks, Inc.
CASE STUDY: In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Inside, learn about one offering that combines network, cloud and endpoint security capabilities, and enables them all with accurate threat intelligence to prevent successful cyber breaches. Read on to find 6 key abilities of this offering that make it stand out
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years, as several best practices already in place in financial service protection strategies that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Discover how BorrowersFirst chose their colocation provider
sponsored by Peak10
CASE STUDY: In this case study, learn why the online lending company BorrowsFirst chose Peak 10 + ViaWest as their colocation provider. Click inside to learn what they gained like quick and simple deployment, simplified compliance management, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Peak10

CW ANZ – November 2017: On cyber alert
sponsored by ComputerWeekly.com
EZINE: In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com

Securing Azure Active Directory: Detection and Alert
sponsored by Quest
WHITE PAPER: Once you've established the baseline for Azure AD security, the next step is to detect when and how changes are made. This white paper highlights four methods with which you can do this. Read on to gain guidance on detecting and alerting on changes to Azure AD groups, using sign-in risk detection, and more.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Quest

A New Way to Look at AWS Security
sponsored by AWS-Cisco
WHITE PAPER: AWS environments that make use of AWS-native services and entity modeling can be protected from known and unknown security threats in a scalable and cost-effective manner. Access this white paper to learn how entity modeling provides a new approach to AWS that ensures security.
Posted: 06 Nov 2017 | Published: 29 Sep 2017

AWS-Cisco

Cisco Stealthwatch Cloud: Features and Benefits
sponsored by AWS-Cisco
RESOURCE CENTER: The cloud offers a myriad of benefits, but only when it is protected. One way to ensure your cloud's security is through monitoring and incident response. Find out how to leverage this security tool to monitor both your public cloud and your private network.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

AWS-Cisco

The Case for Modern SOCs
sponsored by SearchSecurity.com
EZINE: In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

SearchSecurity.com

The Critical Elements of IoT Security
sponsored by Fortinet, Inc.
WHITE PAPER: IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Fortinet, Inc.

Benefits of a Pre-configured Hyper-converged Infrastructure Appliance
sponsored by Dell EMC and Intel®
WHITE PAPER: Download this resource to discover the benefits of a completely integrated, pre-configured, and pre-tested VMware hyper converged infrastructure.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Dell EMC and Intel®

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Google Cloud

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

What does a CISO do now? It's a changing, increasingly vital role
sponsored by SearchSecurity.com
EBOOK: What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

SearchSecurity.com

AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services

Overview of AWS Security: Database Services
sponsored by Amazon Web Services
WHITE PAPER: While the cloud has improved security overall, AWS, aware that it is a large target for cyberattackers hunting for data, has stepped up to the challenge. This white paper gives you an overview of the database security services that AWS provides.
Posted: 09 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Security Analytics
sponsored by ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

ComputerWeekly.com

A Solution for Managing Privileged Access
sponsored by Devolutions
WHITE PAPER: For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Devolutions

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Cloud Secure Virtualization Datasheet
sponsored by IBM
DATA SHEET: Download this sheet to get the technical rundown on a cloud infrastructure that addresses in-house security needs with automated compliance controls and data security for virtualized cloud workloads. You'll learn how to establish virtual workload security down to the microchip level, and more.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

IBM

The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab
1 - 25 of 1103 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement