IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
101 - 125 of 1132 Matches Previous Page  |  Next Page
Malware Mitigation: The Threat of Anomalous Activity
sponsored by The Media Trust
WHITE PAPER: Learn the current state of malware and why you should adopt the tactic of "block first, ask questions later" to improve your security posture against this rising threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

The Media Trust

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec & Blue Coat Systems

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec & Blue Coat Systems

What a Software Defined Perimeter Means for Your Network Security
sponsored by Cryptzone
WHITE PAPER: Learn how the new zero-trust Software-Defined Perimeter security model overcomes limitations of older perimeter-based Network Access Control (NAC) solutions. Learn how your organization can secure access to on-premises, hybrid and cloud-based resources.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Cryptzone

GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec & Blue Coat Systems

GDPR Compliance Risks on Websites
sponsored by The Media Trust
WHITE PAPER: Discover 5 steps to prepare your business for the General Data Protection Regulation (GDPR) which goes into effect in May 2018. Uncover how to create a risk management and GDPR compliance program for your business.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

The Media Trust

Vulnerability Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER: In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.
Posted: 07 Jun 2017 | Published: 07 Jun 2017


Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

How Hybrid Cloud Has Transformed Security of the Data Center
sponsored by TrendMicro
WHITE PAPER: Learn how server security has evolved in the face of cloud computing, and what it takes to secure your company's servers today.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Stopping Crypto Ransomware
sponsored by Datto, Inc.
WHITE PAPER: Discover a 16-point guide to combating crypto ransomware in today's threat landscape.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
WHITE PAPER: According to the National Small Business Association, 44% of small businesses have been the victim of a cyberattack and the number of breaches reported per year continues to climb. Learn how to develop a robust, multi-layered cybersecurity strategy for SMBs.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

SANS Review: SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: In this brief resource, SANS reviews Arctic Wolf's SOC-as-a-Service offering so you can see how it stacks up against the competition.
Posted: 02 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

Cloud Computing Top Threats
sponsored by HPE and Intel® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and Intel® Corporate

How to Prepare for a Cloud DDoS Attack on an Enterprise
sponsored by F5 Networks
EGUIDE: Learn the truth behind cloud DDoS attacks and how an enterprise that uses cloud services could protect itself against such a threat.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

A Closer Look at Cloud Migration Security Risks
sponsored by F5 Networks
EGUIDE: Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk Software, Inc
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.
101 - 125 of 1132 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement