IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
126 - 150 of 1011 Matches Previous Page  |  Next Page
Extend Your Access Management Regime To Office 365
sponsored by IBM
WHITE PAPER: See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

IBM

ESG Lab Review: Performance and Scalability as Key Firewall Requirements
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Juniper Networks, Inc.

The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE: In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

Proofpoint, Inc.

Think Again if you believe your email archiving problems are solved with Office 365
sponsored by LogicNow
WHITE PAPER: Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Email Security Strategies for Mid-Sized Enterprises
sponsored by LogicNow
WHITE PAPER: Discover how to create an email strategy to combat not only traditional spam attacks, but also malware, spear/phishing, denial of service, directory harvest attacks, and more. Learn the potential damage these attacks can create and how to mitigate the risks.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Real-Time Voice Authentication at the Call Center
sponsored by NICE Systems, Inc
WHITE PAPER: Biometrics offers one of the best opportunities to improve security and the customer experience. Discover how your enterprise can reduce handle time by 25 to 45 seconds, save significantly in the call center, and more.
Posted: 23 Aug 2016 | Published: 31 May 2016

NICE Systems, Inc

How Banks Secure Conversations with their Most Valued Customers
sponsored by NICE Systems, Inc
WHITE PAPER: Voice biometrics technologies are proving to be the ideal candidate for intelligent authentication in the context of client-to-advisor conversations. Discover ways to leverage a person's voice as an accurate identifier without interrupting the natural flow of conversation.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

NICE Systems, Inc

Benchmark Your Threat Detection Effectiveness
sponsored by RSA
WHITE PAPER: This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA

Security Strategies for the Financial Sector
sponsored by Unisys
WHITE PAPER: Financial institutions must tighten security to stop threat actors, or they could create a chain reaction and cripple world trade. Access this resource to learn about tools with a history of stopping cybercrime in the banking industry.
Posted: 23 Aug 2016 | Published: 29 Jul 2016

Unisys

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

Security Solution Trends 2016
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.
Posted: 22 Aug 2016 | Published: 04 Dec 2016

Juniper Networks, Inc.

Info-Tech Research Group SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: In this Info-Tech research report, discover the effectiveness and simplicity SIEM can bring to threat management for your organization. Uncover pros and cons of leading SIEM products, insights on where the SIEM market is going, and more.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

How to Approach Storage Disaster Recovery
sponsored by Rubrik
EGUIDE: In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
Posted: 22 Aug 2016 | Published: 18 Aug 2016

Rubrik

Minimizing the Identity Attack Vector with Continuous Authentication
sponsored by RSA Softcat
WHITE PAPER: Learn how continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

Don't let your on-premises Active Directory be your Achilles' heel
sponsored by Dell, Inc.
WHITE PAPER: Learn how a hybrid Active Directory (AD) can keep your network safe from the vulnerability normally suffered by on-premises ADs. Discover how it establishes configuration baselines, detects and alerts administrators of realized and potential threats, and remediates unauthorized access and security changes.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Dell, Inc.

University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USMTM
sponsored by AlienVault
WHITE PAPER: University of Wisconsin–Superior's IT team was looking to replace their outdated intrusion prevention system. In this case study, discover how they were able to overcome budget challenges in order to find a solution that still met the security needs of their large network.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

AlienVault

Podcast: Exploring the Security Risks of Healthcare Orgs
sponsored by OpenDNS
PODCAST: Half of hospitals in the United States have been hit with ransomware. Learn how hospitals are often set up to fail and what your healthcare organization can do to overcome security shortcomings.
Posted: 19 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
sponsored by TrendMicro
EGUIDE: In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
Posted: 18 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

Testing the Cloud: Ensuring Enterprise Data is Secure
sponsored by TrendMicro
EGUIDE: In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
Posted: 17 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Perspective: The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records savings, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor
126 - 150 of 1011 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement