IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
26 - 50 of 1127 Matches Previous Page  |  Next Page
The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM). Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR).
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

CW ANZ - December 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

SearchDataCenter.com

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

How Many Network Connected Medical Devices Does Your Organization Have?
sponsored by Zingbox
RESOURCE: IT security experts agree that internet-connected medical things (IoMT) are the weakest spots in a hospital's security umbrella. Discover the vulnerabilities of IoMT and the new regulatory standards being developed to patch them.
Posted: 30 Nov 2016 | Published: 05 Oct 2016

Zingbox

A Network Security View Of Docker Containers
sponsored by NeuVector
WEBCAST: Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall.
Posted: 30 Nov 2016 | Premiered: Oct 31, 2016

NeuVector

Banking Security in Today's Mobile World
sponsored by HID
RESOURCE: This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.
Posted: 30 Nov 2016 | Published: 30 Sep 2016

HID

Give Them Access. NOT a VPN
sponsored by Bomgar Corp.
RESOURCE: Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk.
Posted: 29 Nov 2016 | Published: 29 Nov 2016

Bomgar Corp.

Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID

Guide & Checklist to Container Security
sponsored by NeuVector
WHITE PAPER: This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

NeuVector

Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

When "Free" is not Free: The True Costs of Open Source
sponsored by Rogue Wave Software
WEBCAST: In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.
Posted: 28 Nov 2016 | Premiered: Oct 31, 2016

Rogue Wave Software

How Midmarket IT Leaders Can Improve Their Data Security
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures.
Posted: 28 Nov 2016 | Published: 13 Sep 2016

Arctic Wolf Networks, Inc.

A CIO’s Guide for Reducing Security Anxiety
sponsored by BitSight
WHITE PAPER: Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

BitSight

Marisol Enables Secure BYOD
sponsored by BitGlass
CASE STUDY: Learn how Marisol International enabled secure access to corporate data form any mobile device without the need for software agents. Discover how they can now access rich visibility and analytics, enabled selective wipe of corporate data, and more.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

How MDM Software Exposes Your Personal Data
sponsored by BitGlass
WHITE PAPER: Mobile device management software is widely used in organizations embracing the BYOD movement, but how much does it truly monitor? In this case study, several willing participants had MDM software installed on their personal devices. The outcome? Access this case study to find out.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

The Intricacies of a CASB Revealed
sponsored by BitGlass
WEBCAST: This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.
Posted: 23 Nov 2016 | Premiered: Aug 10, 2016

BitGlass

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

Top 6 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: Discover solutions to your cloud worries and how to maximize the benefits of its adoption. Learn how to overcome: concerns about cloud security, applications that aren't cloud ready, unexpected costs, and more.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Commvault

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Top 5 SIEM Challenges for the Midmarket
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Arctic Wolf Networks, Inc.

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

The 7 Step Hack: Thinking Like a Cybercriminal
sponsored by Bomgar Corp.
RESOURCE: Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Bomgar Corp.

Incident Response
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: This webcast looks at the steps you should take to respond to a security incident and to develop your own incident response plan.
Posted: 22 Nov 2016 | Premiered: Jul 11, 2016

Arctic Wolf Networks, Inc.
26 - 50 of 1127 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement