IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
151 - 175 of 1172 Matches Previous Page  |  Next Page
Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority

6 Discoveries IT Security Pros Need to Know about SSL Inspection
sponsored by A10 Networks
RESOURCE: Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

How to Uncover Threats in SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

A10 Networks

Five Ways to Secure Mobile Data with EMM
sponsored by Appthority
EGUIDE: This expert e-guide details 5 ways to secure mobile data using enterprise mobility management (EMM) to keep your organization on the cutting edge.
Posted: 14 Feb 2017 | Published: 10 Feb 2017

Appthority

Agility meets Control: 3 Ways to Boost Security in the Cloud
sponsored by Microsoft
WHITE PAPER: Explore how to implement modern, cloud-capable security strategies that empower rather than hinder development and innovation. Find out 3 ways to boost security in the cloud with Windows Server 2016, starting with your OS, your data center and critical workloads, business apps, and more.
Posted: 14 Feb 2017 | Published: 31 Dec 2016

Microsoft

Timing the Perfect ADC Vendor Refresh
sponsored by A10 Networks
WEBCAST: Today's market is all about the app, and consumers care about one thing: accessing them from anywhere, anytime, and above all - securely. Learn how a smart application delivery controller vendor refresh will improve performance, security, management and support..
Posted: 14 Feb 2017 | Premiered: Oct 28, 2016

A10 Networks

Vendor Risk Management Checklist
sponsored by ModoModo
WHITE PAPER: As outsourcing becomes the norm with more and more aspects of an enterprise's operations managed by third parties, these organizations expose themselves to a growing amount of shared risk. The following checklist can serve as a guide to help your organization mitigate vendor risk.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

How to Implement Practical Security Assessments
sponsored by ModoModo
WHITE PAPER: This white paper covers ways to gain perspective about your security based on developing a proper and balanced perspective in the rather oblique world of assessments.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

Understanding and Overcoming Cloud Security Threats
sponsored by Peak10
WHITE PAPER: The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Peak10

extending-global-load-balancing-to-the-cloud-with-secondary-dns[1].pdf
sponsored by Dyn
WHITE PAPER: With internet threats on the rise, global load balancing and secondary DNS service are more imperative than ever. Learn how to provide your organization with flexibility, availability, performance, and visibility.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Dyn

Everything You Need To Know about a DDOS Attack
sponsored by Dyn
WHITE PAPER: Not only gain deep insight into how DDOS attacks operate, the kind of damage they do, and what they can take from your organization, but also what you can do about it, the lasting damages they can inflict, and what you can do to reduce the threat.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Dyn

6 Questions Every CIO Should Ask About Cloud Security
sponsored by IBM
WEBCAST: Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.
Posted: 10 Feb 2017 | Premiered: Feb 10, 2017

IBM

How to Eliminate Network Blind Spots in Visibility and Security
sponsored by Ixia
WHITE PAPER: Poor network and application performance monitoring tools and practices can lead to costly and tedious issues down the road. Is there a secret to attaining improved visibility, reliability AND substantial ROI?Zeus Kerravala weighs in.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Ixia

Simplify and Accelerate Identity Protection on The Cloud
sponsored by IBM
WHITE PAPER: Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.
Posted: 10 Feb 2017 | Published: 30 Jun 2015

IBM

Britannia Hotels Protects Sensitive Customer Data and Stays Compliant
sponsored by OpenText
CASE STUDY: In this case study, learn how Britannia Hotels met new PCI DSS compliance standards without overburdening their organization or fundamentally changing the way they do business.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

OpenText

Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Dyn

Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

How the Houston Astros Protected their Network from Internet Threats
sponsored by ContentKeeper
CASE STUDY: Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE: Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

BitSight

IDC Analyst Connection: Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Networks have changed drastically since the first firewall was introduced, and as a result, networking pros can no longer assume traffic within the perimeter can be trusted. In this Q&A with IDC's Chris Christiansen, learn how internal segmentation firewalls can help you secure your expanding network.
Posted: 10 Feb 2017 | Published: 31 Jul 2015

Fortinet, Inc.
151 - 175 of 1172 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement