IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1002 Matches Previous Page  |  Next Page
Five Ways to Protect Your Digital Assets
sponsored by Hewlett-Packard Enterprise
RESOURCE: Discover the not only a rundown of the threats that you need to prepare for if disaster strikes, but also the backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards.
Posted: 19 Jan 2017 | Published: 01 Jan 2016

Hewlett-Packard Enterprise

Security Everywhere: A Growth Engine for the Digital Economy
sponsored by Cisco
WHITE PAPER: Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Learn why the belief that the primary purpose of cybersecurity is growth enablement is taking hold among senior finance and line-of-business executives.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

2017 Will be an Exciting Year for IT
sponsored by Splunk
WHITE PAPER: See what this year will hold for cloud, IoT and business analytics, IT operations and DevOps, machine learning, and security. Read on to learn how cloud success depends on the village, the lines between digital and physical will continue to blur due to IoT, 2017 will be a big year for analytics, and more.
Posted: 18 Jan 2017 | Published: 31 Dec 2016

Splunk

LISTEN TO YOUR DATA Profiles of Customer Success With the Splunk® Platform
sponsored by Splunk
WHITE PAPER: This e-book highlights a series of case studies that detail how a wide range of organizations have utilized the Splunk platform in real-world environments to solve problems, such as gain a better understand their digital audience, build a better business process, determine the highest value leads, and more.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Splunk

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security Heading into 2017: Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Access now to solid insights into app security such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Managing Risks and Mitigating Threats in Today's IT Environment
sponsored by TechData - HPE
WHITE PAPER: In this white paper, learn about a complete security platform that takes a risk-based, adversary-centric approach to threat protection to ensure your IT environment remains protected.
Posted: 17 Jan 2017 | Published: 31 Mar 2016

TechData - HPE

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security as it stands today and what organizations need to do to secure the most oft-attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Unified Insights on One Unified Threat Management Market Product
sponsored by WatchGuard Technologies, Inc.
EGUIDE: This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.
Posted: 16 Jan 2017 | Published: 13 Jan 2017

WatchGuard Technologies, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

How to Seamlessly Integrate Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.
Posted: 13 Jan 2017 | Published: 30 Sep 2016

Veracode, Inc.

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases
sponsored by Logentries
WHITE PAPER: Explore 4 use cases that exemplify why real-time analytics are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Logentries

Wi-Fi is Easy, Secure Wi-Fi is the Challenge.
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this eBook, learn about the increasing demand for Wi-Fi, and more importantly, how to secure your wireless network.
Posted: 13 Jan 2017 | Published: 10 Oct 2016

WatchGuard Technologies, Inc.

Application Security Testing Vendor Evaluations
sponsored by Veracode, Inc.
ANALYST REPORT: This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.
Posted: 12 Jan 2017 | Published: 06 Aug 2015

Veracode, Inc.

How to Keep Your Organization Safe from Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Wireless Security: Keeping Intrusion Prevention Systems Simple and Effective
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to avoid wrongful classification of devices on your network, keep your wireless secure, and eliminate false alarms and the effort of defining complex rules to identify rogue wireless devices and manually inspecting them.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Guest Wi-Fi: The Most Valuable Marketing Tool for Physical Businesses
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to keep your Wi-Fi secure, scalable, and feature-rich while gaining insight into its users, their patterns, and other marketing data. Read on to securely gain the capabilities of high-priced marketing without the price tag.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

The Digital Certificate: How It Works, Which to Buy
sponsored by SearchSecurity.com
EBOOK: If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017

SearchSecurity.com

Email-borne Malware Highlights Danger of Over-reliance on Sandboxes
sponsored by Mimecast North America
WHITE PAPER: Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America
1 - 25 of 1002 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement