IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1157 Matches Previous Page  |  Next Page
Identity Management: The Key to Stopping Breaches
sponsored by SailPoint Technologies
WHITE PAPER: With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SailPoint Technologies

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Achieving Optimal IFRS 9 Compliance
sponsored by SAS
WHITE PAPER: Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SAS

How to Secure Your Digital Experience
sponsored by Oracle Corporation
WEBCAST: Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape
Posted: 24 Apr 2017 | Premiered: Apr 19, 2017

Oracle Corporation

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

IAM: Your Tool to Defeating Data Breaches
sponsored by SailPoint Technologies
WHITE PAPER: A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

Security Report: Transaction Monitoring Optimization
sponsored by SAS
WHITE PAPER: Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.
Posted: 21 Apr 2017 | Published: 31 Dec 2016

SAS

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation
sponsored by SAS
WHITE PAPER: Failing to comply with the GDPR results in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SAS

Key Considerations in Deploying an SSL Solution
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn what you need to know about Secure Sockets Layer (SSL) and how to construct your security strategy.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

SailPoint-Get-Ready-for-GDPR
sponsored by SailPoint Technologies
WHITE PAPER: Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


The Role of Policy in Governing and Securing the Cloud
sponsored by Apcera
WHITE PAPER: Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches, 4 key areas where you need security policy, a 3-part methodology to modern policy, and more.
Posted: 21 Apr 2017 | Published: 29 Feb 2016


Do You Know Who Owns Your Data?
sponsored by SailPoint Technologies
WHITE PAPER: Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

SailPoint Technologies

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise

The Ultimate Guide to the CCSP
sponsored by ISC2
WHITE PAPER: Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

ISC2

Employee Monitoring: An Important Security Measure?
sponsored by Veriato, Inc.
EGUIDE: Learn how to mitigate the threat posed by threats from within your own enterprise, and what court rulings could affect this.
Posted: 19 Apr 2017 | Published: 12 Apr 2017

Veriato, Inc.

Is the Future of Enterprise Security In Managed Services?
sponsored by F5 Networks
WHITE PAPER: Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

F5 Networks

77% of Hacked Passwords Comply with Current Standards
sponsored by Specops Software
RESOURCE: Discover a method of granulated password policy application that provides protection and support not available under the default Window's password policy. Also uncover a link to a password strength auditor and more.
Posted: 19 Apr 2017 | Published: 10 Feb 2017

Specops Software

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

Hackers Share Secrets so You Can Make Their Job Harder
sponsored by Thycotic
WHITE PAPER: Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts.
Posted: 19 Apr 2017 | Published: 31 Dec 2016

Thycotic

What New NIST Password Recommendations Should Enterprises Adopt?
sponsored by Specops Software
EGUIDE: Learn what makes a password effective for your enterprise, password best practices, and what can be learned from the NIST guidelines.
Posted: 18 Apr 2017 | Published: 11 Apr 2017

Specops Software

A Safe Password System? Here's How
sponsored by Specops Software
EGUIDE: Learn the ropes of what makes for more effective password risk management, how to avoid common pitfalls organizations make in implementing password policies, and 3 major risks of password compromise.
Posted: 18 Apr 2017 | Published: 11 Apr 2017

Specops Software

NSS Labs Advanced Endpoint Protection Test Report
sponsored by McAfee, Inc.
WHITE PAPER: NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this product and its security effectiveness.
Posted: 18 Apr 2017 | Published: 14 Feb 2017

McAfee, Inc.

Passwords Defined: Build Stronger Passwords
sponsored by Specops Software
WHITE PAPER: Learn 2 actionable insights to make your passwords less vulnerable to brute force and dictionary-style attacks. Discover what makes common passwords weak, and what to avoid when choosing yours.
Posted: 18 Apr 2017 | Published: 05 Dec 2016

Specops Software
1 - 25 of 1157 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement