IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureReports
226 - 250 of 745 Matches Previous Page  | Next Page
Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you improve efficiencies, reduce risks, and maximize ROI.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

2013 MarketScope Report for Web Access Management
sponsored by IBM
ANALYST REPORT: This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Posted: 15 Apr 2014 | Published: 15 Nov 2013

IBM

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Balance End User Satisfaction and Business Productivity
sponsored by BlackBerry
WHITE PAPER: This white paper talks about the benefits of corporate owned, personally enabled devices that provide a lot of the same benefits as BYOD, but without the security issues.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

BlackBerry

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
sponsored by Gartner
BROCHURE: Access the following event brochure to see exactly what will be covered at this year's Gartner Catalyst Conference. Gain a firsthand look at the featured speakers, prices, scheduling, and of course, where you can register.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Gartner

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Test Data Management for Security and Compliance
sponsored by EMC Corporation
WHITE PAPER: As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Sourcefire
226 - 250 of 745 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement