IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
26 - 50 of 778 Matches Previous Page  |  Next Page
Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: This video teaches you about a solution with micro incident response capability that will protect your network 24/7, 365 days per year. Access now to stop simple breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
RESOURCE: From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 19 Apr 2016 | Published: 27 Feb 2016

Dimension Data

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Cyber Security Breakdown: What Legal Professionals Need to Know
sponsored by eSentire
WHITE PAPER: Be proactive against advanced cyber threats before they hit your organization. Access this resource now to learn how you can take the steps necessary to be fully protected.
Posted: 18 Apr 2016 | Published: 01 Feb 2016

eSentire

Federated Access Management: The New Era of Secure Access
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper teaches you about the evolution of access management and what's driving modern access security requirements. Continue reading to learn about Federated Access Management and discover painless migration strategies to adopt this new breed of access management.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Ping Identity Corporation

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

Consider Security in your Daily Business Operations
sponsored by IntraLinks, Inc
EGUIDE: This e-guide teaches you the importance of collaboration on a micro level for defending your organization against cyber threats. Learn how to embed security practices in your daily business practices and embrace a flexible mindset as your business needs change.
Posted: 15 Apr 2016 | Published: 06 Apr 2016

IntraLinks, Inc

A New Approach to Data Center Security
sponsored by VMware, Inc.
WHITE PAPER: In the following brief resource, learn how businesses are deepening their data center security strategies and effectiveness through micro-segmentation. View now and learn how this strategy enables security from the base level and can tie security directly into workloads as well as automatically provision policies when needed most.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

VMware, Inc.

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Designing Single Sign-On Architecture for Enhanced Security
sponsored by CA Technologies
WHITE PAPER: This white paper describes how single sign-on and session management, across a wide variety of sites using host-only cookies, can make their theft much more difficult by using a centralized star topology. Access now and discover more benefits to this method.
Posted: 12 Apr 2016 | Published: 27 Feb 2015

CA Technologies

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

Make Micro-segmentation Work for Your Network: A Collection of Customer Stories
sponsored by VMware, Inc.
CASE STUDY: Read now to discover how organizations have used micro-segmentation – a breakthrough model for data center security – to improve network security, agility, and flexibility.
Posted: 11 Apr 2016 | Published: 31 Jul 2015

VMware, Inc.

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: This white paper shows you the latest threat intelligence trends and how your organization can better your cyber security practices. Access now to review a systematic guide to help you understand where your organization resides on the path to mature threat intelligence.
Posted: 08 Apr 2016 | Published: 01 Mar 2016

ThreatConnect

The Economics of Enterprise Data Protection on Cost and Scalability
sponsored by Sempre Technologies Ltd
EGUIDE: In this e-guide, experts reveal top tips for rising organizations' data protection needs. Uncover cost and scalability considerations for your data protection purchasing phase, as well as the economic impact of data protection in the enterprise.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Sempre Technologies Ltd

Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work
sponsored by Sierraware
WHITE PAPER: As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.
Posted: 05 Apr 2016 | Published: 30 Mar 2016

Sierraware

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Provide a Unified, Coherent Developer Experience using Cloud-based Identification
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide teaches you about a centralized security tier to enable single sign-on across multiple enterprise, partner and cloud services. Learn how to create a cloud gateway to access applications running across multiple back ends so developers spend less time implementing new security frameworks for each service.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Be More Secure With Micro-Segmentation
sponsored by VMware
WHITE PAPER: This short infographic specifically identifies one way that you can improve security within the confines of your data center. Explore how using micro-segmentation can help create partitions that will prevent attackers from rampaging through your data center.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

VMware

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Growing Security Concerns Across Industries
sponsored by Dell, Inc.
EGUIDE: This e-guide illustrates the survey results of more than 1,300 business and IT decision makers across seven countries. They found that, while the C-suite is more invested in data security than in the past, executives are still not allocating the energy and resources to properly address data security.
Posted: 12 Apr 2016 | Published: 07 Apr 2016

Dell, Inc.
26 - 50 of 778 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement