IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
176 - 200 of 997 Matches Previous Page  |  Next Page
Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Endpoint Security Suite Evaluations
sponsored by Carbon Black
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 27 Oct 2016 | Published: 19 Oct 2016

Carbon Black

IT Security 101: Thinking Like a Cybercriminal?
sponsored by Solarwinds MSP
EBOOK: Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Solarwinds MSP

Uncheck Yourself: Build a Security-First Approach to Avoid "Checkbox" Compliance
sponsored by Armor
WHITE PAPER: This white paper helps you understand compliance as simply a reporting function of a sound security posture. By devoting adequate resources to countering today's threats, you'll find that your organization can meets all or nearly all compliance requirements, simply by following sound security practices.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Armor

4 Ways to Protect and Recover from Ransomware Attacks
sponsored by Commvault
WHITE PAPER: Discover 4 best practices to protect and recover from ransomware attacks with confidence when you download this white paper.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Commvault

SECURITY INVESTIGATION, DETECTION & RAPID RESPONSE WITH SPLUNK ENTERPRISE
sponsored by Splunk
WHITE PAPER: In this technical white paper, learn how to strengthen your overall security posture by simply interacting and exploring your data to find evidence of an infection or a breach. Learn how to use Splunk to search for keywords, terms or values to gain critical insights into your security posture.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Splunk

Endpoint Security Suite Evaluations
sponsored by Trend Micro
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 25 Oct 2016 | Published: 19 Oct 2016

Trend Micro

Game Over: 3 Scenarios Where Compliance Isn't Enough
sponsored by Armor
WHITE PAPER: Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Armor

Inside The 6 Principal Layers of The Cloud Security Stack
sponsored by Armor
WHITE PAPER: If only 33% of IT professionals believe that their organization's cloud security is up to par, what do you think about yours? Access now to gain valuable insight into cloud security strategies and tools to save your enterprise money and the hassle of a breach.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Armor

AWS Cloud: Improve Your Security Posture
sponsored by Armor
WHITE PAPER: Learn how to instantly defend your AWS operating systems with the right tools, processes, threat intelligence, and analysis without the burden of cumbersome management or expensive deployments.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Armor

Guide to PCI Compliance in the Cloud
sponsored by Armor
WHITE PAPER: Discover how to achieve complete control of your IT environment when you pursue PCI DSS compliance on your DIY cloud security environment. Learn the basics of compensating controls, gain an understanding of the latest version of PCI DSS, and more.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Armor

Provide the Ideal Frontline Firewall Defense
sponsored by Barracuda Networks
WHITE PAPER: Discover the vulnerabilities of your application servers that malicious users are looking to exploit. Learn about what kinds of attacks to expect and how to provide a stellar frontline defense against these threats.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Barracuda Networks

Ransomware, Phishing and APTs: What Can be Done
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Barracuda NextGen Firewall Advanced Threat Detection
sponsored by Barracuda Networks
WHITE PAPER: Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Stop Malware Before It Stops You
sponsored by Trustwave
WHITE PAPER: Discover how to detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.
Posted: 18 Oct 2016 | Published: 31 Dec 2013

Trustwave

Best-of-Breed Next-Generation Security For the Mid-Market
sponsored by Barracuda Networks
WHITE PAPER: Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Thycotic

Don't Guess. Test. Uncover Your Security Vulnerabilities
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Tolly Report: IBM Security Network Protection XGS 7100 Evaluation
sponsored by IBM
RESOURCE: This report shows you the test results found by Tolly of IBM Security Network Protection XGS 7100 appliance. Learn how this next-generation intrusion prevention appliance faired in attack detection, blocking of various threat corpora, multi-protocol throughput and other tests.
Posted: 24 Oct 2016 | Published: 01 Feb 2016

IBM

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

How to Segment Cloud Workloads for Better Security
sponsored by IBM
EGUIDE: Enterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016

Unisys
176 - 200 of 997 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement