IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
101 - 125 of 768 Matches Previous Page  |  Next Page
Three Ways Companies are Slashing IT Costs with VDI
sponsored by Citrix
WHITE PAPER: This white paper describes the experiences of three companies who fortified security, reduced costs, simplified IT and met their business objectives.
Posted: 19 Feb 2016 | Published: 19 Feb 2016

Citrix

The Need For a New Network Security Strategy in Today's Mobile Enterprise
sponsored by Aruba Networks
ANALYST REPORT: Large organizations face a difficult challenge on two distinct fronts including, the fight against cyber-criminals and the BYOD trend. Access this white paper to discover how enterprises can mitigate risk in the dynamic environment.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Norton Cyber Security Insights Report – UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

The Need-to-Know of Today's Cloud Security
sponsored by SearchCloudComputing.com
EBOOK: In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

SearchCloudComputing.com

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

Norton Cyber Security Insights Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime
Posted: 16 Feb 2016 | Published: 16 Feb 2016

ComputerWeekly.com

Next Generation Firewall for Dummies
sponsored by Palo Alto Networks
EBOOK: This eBook provides and in-depth overview of next-gen firewalls.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Palo Alto Networks

Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO: This white paper gives you insight on how to protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014

Palo Alto Networks

Zero Trust on the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER: This white paper teaches you a "never trust, always verify" security policy that remedies the deficiencies with perimeter-centric strategies and ensures there's no default trust for any entity or user.
Posted: 11 Feb 2016 | Published: 31 Mar 2015

Palo Alto Networks

Why it's Time for Locked-Down Desktops
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Advanced Endpoint Protection for Dummies (EBook)
sponsored by Palo Alto Networks
EBOOK: Get an in‐depth examination of the modern threat landscape — including malware, exploits, and vulnerabilities — as this ultra-popular "Dummies" guide reveals the shortcomings of traditional endpoint protection solutions.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

How to assess your applications' security vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: Discover how to triage the most critical open source security threats inside with this 4 step guide.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Cybersecurity Buyers Guide
sponsored by Palo Alto Networks
WHITE PAPER: This white paper shows you how to keep up with the hackers and defend against all advanced threats. Read more to learn how to architect a cyber security solution that dynamically adapts to changing threats.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

The Anatomy of an Attack
sponsored by Alert Logic
RESOURCE: This infographic describes different types of attacks and how exactly they are implemented. Learn how to secure your vulnerabilities and keep a look out for all the described attacks.
Posted: 19 Feb 2016 | Published: 29 Jan 2016

Alert Logic

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

The top threat intelligence services for enterprises
sponsored by UnitedLex
EGUIDE: If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Encryption's Risks, Benefits, and Roles in SSL Attacks
sponsored by Symantec Website Security
EGUIDE: In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
Posted: 10 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
sponsored by Symantec Website Security
EGUIDE: This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
Posted: 09 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security
101 - 125 of 768 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement