IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
226 - 250 of 992 Matches Previous Page  |  Next Page
SANS Survey Report: Incident Response Capabilities in 2016
sponsored by Intel Security
RESEARCH CONTENT: The 2016 SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.
Posted: 26 Sep 2016 | Published: 30 Jun 2016

Intel Security

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Building Natural Active Immunity against Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, you can strengthen your company's defenses against advanced and unknown threats. Access this white paper to learn more.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Fortinet, Inc.

How GuideStar Stabilized Website Availability by Blocking Bad Bots
sponsored by Distil Networks
CASE STUDY: Learn how GuideStar countered their invasive bot problem, stabilized their site to recover 99.7% uptime, and still allowed good traffic to get through unhindered. Also discover how they saved 20 hours a month of IT effort and reigned in an out-of-control issue that seemed insurmountable.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Distil Networks

How Graphiq Blocked Bot Data-Scrapers & Improved SEO
sponsored by Distil Networks
CASE STUDY: Uncover not only how to block bot data-scrapers, monitor suspicious activity, and eliminate spikes in traffic, but also how to significantly improve the user experience. Also learn how to deploy an automatically updating "known violators" database to keep up with the latest threats.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Distil Networks

How To Easily Start Your Implementation Planning for Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Discover how effective planning can ease your organization's adoption of Office 365. Uncover a comprehensive step-by-step to build your cloud "to-do" list: making sure you address what access controls need to be considered, what service characteristics there will be, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Blue Coat Systems

How Glassdoor Blocks Unwanted Bad Bots
sponsored by Distil Networks
CASE STUDY: Learn how Glassdoor ensured their site metrics by proactively reducing bad bot traffic. Discover how they implemented a proactive (and not after-the-fact) strategy, ensured 99.9% of advertising platform traffic comes from real humans, and avoided driven up infrastructure costs.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Distil Networks

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

Focus: IT Security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

ComputerWeekly.com

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

What Trust Can Mean to Your Enterprise's Cloud Policy
sponsored by Entrust, Inc.
ANALYST BRIEF: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Keeping the Keys to Your Cloud Future Secure
sponsored by Entrust, Inc.
RESOURCE: Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Protecting Web Services for the French Tennis Federation
sponsored by EfficientIP
CASE STUDY: Learn how the French Tennis Federation (FFT) chose to tackle the task of ensuring seamless coverage for the French Open by unifying network management, protecting against DNS attacks, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

EfficientIP

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Importance of Incident Response Collaboration
sponsored by Dimension Data
EGUIDE: This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
Posted: 22 Sep 2016 | Published: 21 Sep 2016

Dimension Data

From DevOps to DevSecOps: Integrating Security
sponsored by BMC
EGUIDE: They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

Are You Complacent About Mobile Threats?
sponsored by Lookout
EGUIDE: In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Lookout

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

BMC

Here's What Your Personal Data is Going for on the Dark Web
sponsored by BMC
ANALYST REPORT: How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.
Posted: 09 Sep 2016 | Published: 22 Jul 2016

BMC
226 - 250 of 992 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement