IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 777 Matches Previous Page  |  Next Page
Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

IDC-Analyst-Connection-ISFW
sponsored by Fortinet, Inc.
ANALYST REPORT: This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.
Posted: 28 Apr 2016 | Published: 01 Jul 2015

Fortinet, Inc.

SG-ISFW-Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

Get Ahead of Threats
sponsored by Fortinet, Inc.
EBOOK: This e-book is a collection of 24 essays on a broad array of network security topics. It also introduces a firewall system that covers your enterprise, end-to-end.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Fraud Protection Doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER: This white paper shows you how you may reduce the time and cost of fraud protection while helping make your customers' transactions safer. Learn about highly effective intelligence and evidence-based fraud detection with fewer false positive.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Machine Learning Is Cybersecurity’s Answer to Detecting Advanced Breaches
sponsored by Prelert
ANALYST REPORT: This blog post talks about replacing legacy safeguards with new machine learnings, the heart of IT's shift in mindset. Access now to learn how to focus on identifying potential threats early rather than reacting to threats after they happen.
Posted: 25 Apr 2016 | Published: 21 Mar 2016

Prelert

Star Wars X – Attack of the DROWNs: Machine Learning-based Anomaly Detection Finds the DROWN SSLv2 Vulnerability
sponsored by Prelert
ANALYST REPORT: This blog post teaches you about the DROWN vulnerability and exactly why it could be affecting your organization. Learn the great impact DROWN has had in the past and what you can do to patch this vulnerability.
Posted: 25 Apr 2016 | Published: 19 Apr 2016

Prelert

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

Commvault

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

10 Questions to Ask Your Vendor about File Gateway Consolidation
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

IBM

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to get inside black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

Navigating the Challenges with Wireless Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores the four drivers of Wi-Fi usage that are behind the explosion of wireless connectivity and the security implications that mustn't be forgotten.
Posted: 19 Apr 2016 | Published: 01 Jan 2016

WatchGuard Technologies, Inc.

2016 Security Predictions
sponsored by TrendMicro
ANALYST BRIEF: This article shows you growing trends over the past year plus gives you predictions about cybercrime moving forward. Learn what organizations across industries are doing to curb their risks for attacks and what you can do to prepare yourself for the future of cybercrime.
Posted: 19 Apr 2016 | Published: 15 Oct 2015

TrendMicro

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: This video teaches you about a solution with micro incident response capability that will protect your network 24/7, 365 days per year. Access now to stop simple breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

Accelerate Your Digital Business Through Cybersecurity
sponsored by Dimension Data
VIDEO: Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.
Posted: 19 Apr 2016 | Premiered: 01 Feb 2016

Dimension Data

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
RESOURCE: From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 19 Apr 2016 | Published: 27 Feb 2016

Dimension Data

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Executive_Summary_DefendAgainstTheUndetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.
1 - 25 of 777 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement