IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureReports
201 - 225 of 610 Matches Previous Page  | Next Page
IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 14 Jan 2014 | Published: 14 Jan 2014

Hewlett-Packard Company

Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE: In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

IAM Evaluation And Deployment Guidelines
sponsored by OpenIAM
EGUIDE: Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014


Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
sponsored by Cisco
WHITE PAPER: This whitepaper details the trouble modern firewalls have with protecting your data from modern threats and offers a next-generation solution for your organization.
Posted: 09 Jan 2014 | Published: 15 May 2013

Cisco

Single Sign On and Web Access Control Made Easy
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a unified, integrated identity and access management (IAM) system that uses a service oriented architecture (SOA) stack feature to simplify web access security for on- and off-premise applications.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

OpenIAM

Taking your enterprise mobile:  Executive checklist
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment.
Posted: 02 Jan 2014 | Published: 02 Jan 2014

Citrix

Embracing BYOD through secure app and data delivery EMM
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses an enterprise mobility management (EMM) solution that empowers consumerization and bring your own device (BYOD) programs through secure application and data delivery allowing for a diverse, productive and efficient mobile environment.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix

Integrating Microsoft Technologies with an Identity and Access Management Solution
sponsored by OpenIAM
WHITE PAPER: In this whitepaper, learn how one comprehensive identity and access management (IAM) solution can be easily integrated with your existing Microsoft technologies, as well as non-Microsoft tools.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

OpenIAM

Delivering Success that Scales with the Largest Enterprises
sponsored by IBM
WHITE PAPER: Securing your IT system can be complex and expensive, but many businesses are implementing comprehensive security solutions to collect and monitor their high data volumes. This guide highlights a powerful security intelligence platform that can save your IT department time and money.
Posted: 26 Dec 2013 | Published: 31 Jan 2013

IBM

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: This valuable resource highlights the renewed focus on firewalls to improve security given the increasing complexities in network architectures. Click now to explore next-generation firewalls, and 10 things that they must do to protect your organization.
Posted: 24 Dec 2013 | Published: 19 Aug 2013

Palo Alto Networks

Extending Security Intelligence with Big Data solutions
sponsored by IBM
WHITE PAPER: Cybercriminals are continuing to grow and their tactics are becoming more refined. This guide outlines the role big data plays in IT security and how analytics can help thwart cybercrminals.
Posted: 24 Dec 2013 | Published: 31 Jan 2013

IBM

Cost-effective, Compliance-ready Open-source Identity Management
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a scalable, cost-effective identity management solution that improves risk management, end-user efficiency, and facilitates regulatory compliance.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

OpenIAM

Next-generation Firewalls Enable Secure Mobile Network Access
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
Posted: 09 Jan 2014 | Published: 20 Oct 2011

SafeNet Asia Ltd

Taming the Integration Nightmares of a 1,000 App Enterprise
sponsored by Palo Alto Networks
WHITE PAPER: Access this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
Posted: 26 Dec 2013 | Published: 28 Jan 2014

Palo Alto Networks

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

Security Threat Report 2014 Smarter, Shadier, Stealthier Malware
sponsored by Sophos, Inc.
WHITE PAPER: Looking back at the 2013 threat landscape, one thing is clear, malware attacks are becoming increasingly camouflaged. This in-depth report explores the ever-changing threat landscape and the growing trends of cybercriminals.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Sophos, Inc.

High Performance, High Capacity 2048/4096-bit SSL Offload February 2013
sponsored by A10 Networks
WHITE PAPER: IT professionals are going to great lengths to foster business growth via data encryption. This guide outlines the importance of data protection and encryption, while exploring specific operating systems that provides scalability alongside enhanced performance levels.
Posted: 23 Dec 2013 | Published: 28 Feb 2013

A10 Networks

Overview: Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Security management is a top priority of every IT department, but unfortunately these processes are growing more and more complex each day. This guide explores the importance of comprehensive security strategies and how it can smooth businesses processes while ensuring a secure system.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

IBM
201 - 225 of 610 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement