IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 648 Matches Previous Page  |  Next Page
Internal Webcast- Topic Security- Robert Young IDC Jason Tolu
sponsored by Dell, Inc.
WEBCAST: In the following webcast hear from three experts from IDC and Dell as they reveal their insights on how to use systems management to improve endpoint device security. Watch now and learn about the technology to use and the accompanying strategies that will help drive endpoint security success.
Posted: 06 Oct 2015 | Premiered: Oct 5, 2015

Dell, Inc.

Searching for a Cloud Partner Program? Discover new revenue streams with high margin services
sponsored by Radware
BROCHURE: Access the following exclusive white paper to learn about the services you must be able to provide—and with whom you can partner with to unlock these services—in order to drive greater revenue from existing tenants and build new avenues that will attract new customers.
Posted: 28 Sep 2015 | Published: 28 Sep 2015


Sluggish Incident Response Report:: Next-Gen Security Problems and Solutions
sponsored by FireEye
WHITE PAPER: Identify the issues plaguing network incident response processes and combat shortcomings like limited human resources. Access this report now to glean an overview of the outside security services that your organization can procure to eliminate sluggish incident response.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


A Modern Disaster Recovery Approach Fit for US Government Security Standards
sponsored by NTT America, Inc.
CASE STUDY: In this business impact summary, find out how one government organization formed a flexible, fast, and cloud-based disaster recovery strategy that held up under strict regulations.
Posted: 17 Sep 2015 | Published: 30 Apr 2015

NTT America, Inc.

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014


2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015


Ensuring Security and Compliance in Today's Threat Landscape
sponsored by Splunk
VIDEO: In this video, an expert in security technology discusses what makes a piece of security software effective in today's threat landscape.
Posted: 20 Aug 2015 | Premiered: 19 Jan 2014


Solutions enhance compliant digital identity protection for healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Learn the key building blocks of a secure, compliant healthcare system, and how to solve security problems such as identity proofing, HIPAA and HITECH Act compliance, secure access to data, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

VASCO Data Security International

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger, CEO of Starmobile, joins Brian Madden to hash out app refactoring. They discuss how to extend application virtualization, and capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015


Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014


Three Ways to Leverage Desktop Virtualization To Reduce the Complexity in Securing Endpoints
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore three ways that desktop virtualization can reduce the time and complexity involved in securing endpoints – while also limiting your risk of data loss from security breaches.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Dell, Inc. and Intel®

One Secure Credential for Logical, Physical, Local, and Remote Access
sponsored by HID
WHITE PAPER: This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.
Posted: 24 Jul 2015 | Published: 19 Sep 2013


Case Study: KAS Bank Secures High-value Transactions with Strong Authentication
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a strategy that delivered the highest level of security with a reusable infrastructure.
Posted: 23 Jul 2015 | Published: 25 Mar 2013


Security Solutions for Public, Private and Hybrid Clouds
sponsored by IBM
PRODUCT OVERVIEW: This product sheet offers an inside look into intelligent security services for public, private, and hybrid clouds.
Posted: 20 Jul 2015 | Published: 20 Jul 2015


Are You Risking Security With The Cloud?
sponsored by IBM
EBOOK: This e-book explores the top 5 cloud security threats and offers expert tips to mitigate these attacks and secure your data.
Posted: 20 Jul 2015 | Published: 06 Jan 2015


Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 16 Jul 2015 | Published: 28 Feb 2014

Cisco Systems, Inc.

Can You Tell If Your Cloud Servers Are Under Attack?
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to learn more about gaining visibility into your cloud or virtual infrastructure through an agile security and compliance platform.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More
sponsored by Gartner
WHITE PAPER: Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015


Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jul 2015 | Published: 30 Jun 2015


Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

1 - 25 of 648 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement