IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureReports
126 - 150 of 694 Matches Previous Page  | Next Page
Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

How to Improve Security and Governance for Content Distributed on Mobile Devices
sponsored by bigtincan information
WHITE PAPER: This exclusive paper examines an application solution that allows for the distribution, management, and governance of a range of content, including documents and multimedia, with enterprise-grade security.
Posted: 09 May 2014 | Published: 09 May 2014

bigtincan information

Guarding the Castle
sponsored by Dell Software
WHITE PAPER: Learn the strategies and tools that cybercriminals use to infiltrate your network and how you can stop them. See how you can secure your network every minute of the day, against all types of malware, with a high performance firewall that protects against the latest global threats.
Posted: 08 May 2014 | Published: 08 May 2014

Dell Software

Three Key Strategies to Prevent Network Outages
sponsored by KEMP Technologies
WHITE PAPER: This informative whitepaper explores 3 key strategies for preventing network outages and highlights the top 3 threats to your network uptime.
Posted: 08 May 2014 | Published: 31 Dec 2013

KEMP Technologies

Taking the Enterprise Mobile: Executive Checklist
sponsored by Citrix
WHITE PAPER: This crucial resource examines a mobile management solution that enables your organization to deliver all of your business critical information over mobile while safeguarding corporate IP, customer and employee data, non-public financial information and business intelligence.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

MDM and beyond: Rethinking mobile security in a BYOD world
sponsored by Citrix
WHITE PAPER: This informative paper discusses how your organization can embrace BYOD with full security and control, providing a simple and streamlined user experience.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER: Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013

Ixia

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: This informative paper discusses what elements your mobile security solutions must have in order to ensure that your data is kept safe, providing a list of ten "must-haves" that your organization can use as a framework and a checklist for evaluating mobile vendors.
Posted: 05 May 2014 | Published: 05 May 2014

Citrix

ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

Security Leadership Series: Security Strategies for Success
sponsored by Citrix
WHITE PAPER: This white paper offers best practices for 3 key initiatives that can improve security given the increase in mobility and cloud trends.
Posted: 01 May 2014 | Published: 01 May 2014

Citrix

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Transferring Data without Secure Protocols?
sponsored by GlobalScape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

GlobalScape

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
Posted: 02 May 2014 | Published: 02 May 2014

Neustar®

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.
126 - 150 of 694 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement