IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
201 - 225 of 647 Matches Previous Page  |  Next Page
Achieve Deeper Network Security and Application Control (eBook)
sponsored by Dell, Inc.
EBOOK: Discover a next-generation firewall solution that combats emerging threats effectively and without compromise while reducing the total cost of ownership (TCO). Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell, Inc.

Seven Strategies for Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This informative guide breaks down the nature of malware attacks and what they reveal about the culprit, including their location, ties to other malware attacks, and connections to common threat factors.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Understanding Big Data and Security
sponsored by Hewlett-Packard Limited
WEBCAST: This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.
Posted: 25 Feb 2014 | Premiered: Apr 16, 2013

Hewlett-Packard Limited

Modern network security for modern threats
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

Selecting a Safe and Smart Surveillance Drive
sponsored by Seagate Technology
WHITE PAPER: Check out this white paper to find a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use. Read on and find out which storage controller may be the one that meets your organization's needs.
Posted: 14 Mar 2014 | Published: 28 Feb 2014

Seagate Technology

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Citrix

Secure Mobile Devices with a Next Generation Firewall
sponsored by Dell Software
WHITE PAPER: This white paper provides one suggestion for securing your mobile devices with a next generation firewall.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Technical Guide on Application Security
sponsored by SearchSecurity.com
EZINE: This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

SearchSecurity.com

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE: In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 03 Mar 2014 | Published: 05 Mar 2014

SearchSecurity.com

Securing  Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER: This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012

IBM

Why Protection and Performance Matter: Introducing Next-Generation Firewalls
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to discover the benefits of a next-generation firewall and how it offers top security without causing serious network latency.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell, Inc.

Unified Communications Security
sponsored by NextPlane
WHITE PAPER: This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

NextPlane

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Unified Threat Management: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

SearchSecurity.com

Unified Threat Management: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

SearchSecurity.com

Unified Threat Management: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

SearchSecurity.com
201 - 225 of 647 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement