IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
101 - 125 of 861 Matches Previous Page  |  Next Page
Machine Learning Is Cybersecurity’s Answer to Detecting Advanced Breaches
sponsored by Prelert
ANALYST REPORT: This blog post talks about replacing legacy safeguards with new machine learnings, the heart of IT's shift in mindset. Access now to learn how to focus on identifying potential threats early rather than reacting to threats after they happen.
Posted: 25 Apr 2016 | Published: 21 Mar 2016

Prelert

Star Wars X – Attack of the DROWNs: Machine Learning-based Anomaly Detection Finds the DROWN SSLv2 Vulnerability
sponsored by Prelert
ANALYST REPORT: This blog post teaches you about the DROWN vulnerability and exactly why it could be affecting your organization. Learn the great impact DROWN has had in the past and what you can do to patch this vulnerability.
Posted: 25 Apr 2016 | Published: 19 Apr 2016

Prelert

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

Commvault

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to gain insider black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

2016 Security Predictions
sponsored by TrendMicro
ANALYST BRIEF: As the threats continue to mount, understanding and managing cybersecurity risks are becoming top priority for business and government decision makers, and a renewed willingness to invest in security is a notable measure of progress. Is your organization prepared for tomorrow's projected threats?
Posted: 19 Apr 2016 | Published: 15 Oct 2015

TrendMicro

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Cyber Security Breakdown: What Legal Professionals Need to Know
sponsored by eSentire
WHITE PAPER: Be proactive against advanced cyber threats before they hit your organization. Access this resource now to learn how you can take the steps necessary to be fully protected.
Posted: 18 Apr 2016 | Published: 01 Feb 2016

eSentire

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

A New Approach to Data Center Security
sponsored by VMware, Inc.
WHITE PAPER: In the following brief resource, learn how businesses are deepening their data center security strategies and effectiveness through micro-segmentation. View now and learn how this strategy enables security from the base level and can tie security directly into workloads as well as automatically provision policies when needed most.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

VMware, Inc.

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Designing Single Sign-On Architecture for Enhanced Security
sponsored by CA Technologies
WHITE PAPER: Single sign-on (SSO) and session management, across a wide variety of sites using host-only cookies, can make theft much more difficult for cybercriminals. Discover ways to deliver broader, cross-application SSO for end-users using a central cookie provider.
Posted: 12 Apr 2016 | Published: 27 Feb 2015

CA Technologies

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

Make Micro-segmentation Work for Your Network: A Collection of Customer Stories
sponsored by VMware, Inc.
CASE STUDY: Read now to discover how organizations have used micro-segmentation – a breakthrough model for data center security – to improve network security, agility, and flexibility.
Posted: 11 Apr 2016 | Published: 31 Jul 2015

VMware, Inc.

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: This white paper highlights the latest threat intelligence trends and how to be better equipped to protect your organization from modern cyber threats. Access now to review a systematic guide to help you understand where your organization resides on the path to mature threat intelligence.
Posted: 08 Apr 2016 | Published: 01 Mar 2016

ThreatConnect

Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work
sponsored by Sierraware
WHITE PAPER: As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.
Posted: 05 Apr 2016 | Published: 30 Mar 2016

Sierraware

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

10 Questions to Ask Your File Gateway Consolidation Vendor
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

IBM

Growing Security Concerns Across Industries
sponsored by Dell, Inc.
EGUIDE: This e-guide illustrates the survey results of more than 1,300 business and IT decision makers across seven countries. They found that, while the C-suite is more invested in data security than in the past, executives are still not allocating the energy and resources to properly address data security.
Posted: 12 Apr 2016 | Published: 07 Apr 2016

Dell, Inc.
101 - 125 of 861 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement