IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureReports
51 - 75 of 746 Matches Previous Page  | Next Page
How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation

Vendor Landscape: Intrusion Detection & Prevention Systems
sponsored by IBM
WHITE PAPER: Check out this helpful resource to get an inside evaluation of today's IDPS vendors and products, and uncover which are the best fit for your enterprise needs.
Posted: 12 Sep 2014 | Published: 31 Dec 2012

IBM

A Provactive New Approach to Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: In this informative white paper, discover a new integrated vulnerability assessment and security intelligence solution that can enhance vulnerability insights and improve security efficiency.
Posted: 12 Sep 2014 | Published: 31 Jul 2013

IBM

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

Taming the Mobile File Sharing Beast
sponsored by Novell, Inc.
WHITE PAPER: In this in-depth white paper, uncover a solution for mobile file access that gives users unfettered access while keeping the process totally under IT control.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Novell, Inc.

Log Management—The Foundation for Federal Security and Compliance
sponsored by Intel Security
WHITE PAPER: This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Intel Security

Need for Speed: Streamlining Response and Reaction to Attacks
sponsored by Intel Security
WHITE PAPER: This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
sponsored by Intel Security
WHITE PAPER: SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Needle in a Datastack: The Rise of Big Security Data
sponsored by Intel Security
WHITE PAPER: Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Manage Security and Risk
sponsored by Intel Security
WHITE PAPER: Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

SIEM: Keeping Pace with Big Security Data
sponsored by Intel Security
WHITE PAPER: This detailed report explores how intelligent and scalable Security Information and Event Management (SIEM) solutions can help you stay on top of an ever-evolving, data-driven environment.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Intel Security

Citrix ShareFile Cloud for Healthcare: 10 Days to Facilitate HIPAA Compliance
sponsored by CloudPassage
WHITE PAPER: Check out this white paper to find out how one particular company utilized a virtual private cloud to support HIPAA compliance regulations.
Posted: 09 Sep 2014 | Published: 31 Mar 2014

CloudPassage

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar®
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

How to Create Firewalls for Your Virtual Machines in the Public Cloud
sponsored by Zentera Systems Inc.
VIDEO: This exclusive video covers a fabric that will allow you to build firewalls for your individual virtual machines in a public cloud.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

Zentera Systems Inc.

Cloud Web Security Alleviates Network Congestion
sponsored by Cisco
CASE STUDY: This case study reveals how building supplies distributor MacArthur Corporation, secured internet use in the cloud in order to relieve network congestion, without adding any bandwidth.
Posted: 03 Sep 2014 | Published: 31 Dec 2012

Cisco

How Access Governance Makes Data Loss Prevention Successful
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

RSA, The Security Division of EMC

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Boost Advanced Persistent Threat Security Levels in 6 Steps
sponsored by CDW Corporation
EGUIDE: This e-guide contains expert suggestions for mitigating the dangerous threat presented by APTs.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

CDW Corporation

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM
51 - 75 of 746 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement