IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
176 - 200 of 827 Matches Previous Page  |  Next Page
Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to other growing problems. Access this resource now and learn to identify, quantify and mitigate risk throughout your network.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
sponsored by Blue Coat Systems
WHITE PAPER: This white paper shows you how you can add real-time threat detection and protection to your secure network.
Posted: 04 Feb 2016 | Published: 31 Dec 2014

Blue Coat Systems

The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure
sponsored by TrendMicro
WHITE PAPER: In this white paper, discover how to address cloud security with comprehensive administrative, physical and logical controls.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

TrendMicro

Advanced Threat Defense
sponsored by Blue Coat Systems
EGUIDE: This e-guide will teach you the steps your business should take to protect against new, more advanced threats.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Holistic Data Protection Center: Compliance & E-discovery
sponsored by Commvault
RESOURCE CENTER: Check out this incredible online resource center that's packed with white papers, checklists, e-books, FAQs, videos and product comparisons focused on giving you a better way to protect, manage and gain business value from your data.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Commvault

Are Energy and Utilities at Risk of a Major Breach?
sponsored by BitSight
WHITE PAPER: This white paper discusses the security performance of six key industry sectors.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

All Stars Panel: Healthcare Security Spotlight
sponsored by Optum
VIDEO: Listen in as four senior health IT professionals explore the top security priorities and projects being grappled with in healthcare today, and the strategies that you can adopt to keep your patients' medical information safe from breach.
Posted: 01 Feb 2016 | Premiered: 22 Jan 2016

Optum

Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.
Posted: 01 Feb 2016 | Published: 04 May 2015

Digital Guardian

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

Gartner Competitive Landscape: Endpoint Detection & Response (EDR)
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.
Posted: 29 Jan 2016 | Published: 26 Nov 2014

Digital Guardian

Gartner Competitive Landscape: Data Loss Prevention Market
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

The State of Mobile Application Security
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.
Posted: 26 Jan 2016 | Published: 12 Dec 2013

Digital Guardian

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Client Study: Security Intelligence
sponsored by IBM
WHITE PAPER: This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.
Posted: 25 Jan 2016 | Published: 31 Jul 2015

IBM

Secure the data that powers your business
sponsored by IBM
WHITE PAPER: Find out how you can adopt a proactive, holistic approach to protecting sensitive data across all platforms. Access now and learn how you can protect sensitive data against internal and external threats with encryption, masking and redaction.
Posted: 25 Jan 2016 | Published: 12 Aug 2015

IBM

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Endpoint Threat Detection Gets More Response
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

LogicNow
176 - 200 of 827 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement