IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureReports
101 - 125 of 610 Matches Previous Page  | Next Page
Protecting Your Mid-Size Business from Today's Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Hewlett-Packard Company

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

BlackBerry 10 & BES10 Security Guide: The Perfect Balance of Protection & Productivity
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper examines a mobile security solution that provides end-to-end protection for your mobile data without sacrificing the experience that keeps employees productive and efficient.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

BlackBerry 10: Setting New Standards in Mobile Security
sponsored by BlackBerry
WHITE PAPER: This informative paper discusses a mobile management solution that provides cutting-edge mobile security which centralizes and simplifies your security management, allowing you to give your information the protection it needs.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Separating Work and Personal at the Platform Level, How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This informative resource examines a mobile management solution that partitions work data from personal data using two completely separate file systems, ensuring the security of your sensitive business information.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Protection For Every Enterprise, How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER: This exclusive paper discusses mobile management platform that's been built from the ground up to deliver a high-quality user experience while adhering to the ever-shifting demands of keeping your devices secure.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

The Evolution of the Enterprise…And Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Cybersecurity Imperitives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

Safe and Smart Surveillance Drive Selection Guide
sponsored by Seagate Technology
WHITE PAPER: Check out this informative, concise paper for a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use.
Posted: 14 Mar 2014 | Published: 28 Feb 2014

Seagate Technology

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Implementing a Security Analytics Architecture
sponsored by EMC Corporation
WHITE PAPER: This guide explores the inabilities in traditional security management and how advanced threats are growing even more sophisticated.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Citrix

Achieve Deeper Network Security and Application Control (white paper)
sponsored by Dell Software
WHITE PAPER: Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Achieve Deeper Network Security and Application Control (eBook)
sponsored by Dell Software
EBOOK: Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Next-Gen Security
sponsored by Dell Software
WHITE PAPER: Find out how SSL decryption and inspection can keep attackers away from your data and out of your network. Given that SSL threats are likely to increase, it's more important than ever for businesses to consider purchasing next-generation firewalls.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Mobile Connect
sponsored by Dell Software
WHITE PAPER: Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Mobile Security: How to Protect the Enterprise in the Mobile Era
sponsored by Dell Software
WHITE PAPER: Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

5 Reasons to put ERM Tools on your GRC Shortlist
sponsored by IBM
EGUIDE: This expert guide provides a list of five must have capabilities required to support your GRC or ERM program. Read on and learn how you can keep your critical information safe.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

IBM

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 06 Mar 2014 | Published: 01 Feb 2014

IBM

Technical Guide on Application Security
sponsored by SearchSecurity.com
EZINE: This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

SearchSecurity.com

Five Reasons It’s Time For Secure Single Sign-On
sponsored by Ping Identity Corporation
WHITE PAPER: Access this informative resource to uncover five reasons why your organization should consider secure SSO.
Posted: 06 Mar 2014 | Published: 31 Jul 2013

Ping Identity Corporation

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

Manage data security and application threats with a muli-tiered approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

GlobalScape
101 - 125 of 610 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement