IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
226 - 250 of 701 Matches Previous Page  |  Next Page
Fortinet’s Solution for the Enterprise Campus: High Performance Next Generation Firewall
sponsored by Fortinet, Inc.
WHITE PAPER: This whitepaper explores major trends behind next-generation firewalls and how you can ensure network security while still enabling your employees.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Fortinet, Inc.

Leveraging Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 27 Mar 2014 | Published: 31 Mar 2013

IBM

Leverage Security Intelligence for Financial Services Institutions
sponsored by IBM
WHITE PAPER: In this resource, discover why financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 26 Mar 2014 | Published: 31 Mar 2013

IBM

The Benefits of an Integrated Approach to Security in the Cloud
sponsored by IBM
WHITE PAPER: This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

IBM

Build a Network that Meets the Enterprise Standard of Security
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Endpoint Security Technology
sponsored by TechTarget
RESOURCE: With the increasing number of client devices-endpoints, IT is challenged with managing this sheer volume of endpoints as your organization is left with multiple vulnerabilities. This expert guide details how endpoint protection software can help block malicious network traffic while providing secure access to your sensitive business data.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Still Using Proxies for URL Filtering? There's a Better Way
sponsored by Palo Alto Networks
WHITE PAPER: This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Palo Alto Networks

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Modern network security for modern threats
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

Achieve Deeper Network Security and Application Control (eBook)
sponsored by Dell Software
EBOOK: Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we knew it. Traditional firewalls that only focus on stateful packet inspection and access control rules are not effective in today's advanced-threat environment.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Next-Gen Security
sponsored by Dell Software
WHITE PAPER: SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Sourcefire

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER: This resource contains the results of an international survey on enterprise mobility, consumerization, and mobile security, and also includes considerations for IT departments in light of this new information.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Select a safe and smart surveillance drive built for your needs
sponsored by Seagate Technology
WHITE PAPER: Check out this informative, concise paper for a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use.
Posted: 14 Mar 2014 | Published: 28 Feb 2014

Seagate Technology

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Citrix

Mobile Connect
sponsored by Dell Software
WHITE PAPER: Discover how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Mac OS X, Android™ ,Kindle Fire and Windows 8.1) while protecting your corporate network from mobile security threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

GlobalScape
226 - 250 of 701 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement