IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
51 - 75 of 857 Matches Previous Page  |  Next Page
Top 10 Values of Video Surveillance
sponsored by Pivot3
RESOURCE: Discover 10 reasons why video surveillance should be integrated into your enterprise's security policy, providing such benefits as incident deterrence, regulatory compliance, enhancement of other security systems, and more.
Posted: 08 Jul 2016 | Published: 08 Jul 2016

Pivot3

Reduce the Threat Attack Surface with Prescriptive and Actionable Data
sponsored by BMC
WHITE PAPER: What disconnected security and operations teams need is unprecedented visibility into their environment's threat stature. Learn how to bridge the so-called "SecOps gap" by prioritizing risks and reducing your overall attack surface.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

BMC

The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon

Event Logs and Security: Cutting Through the Noise
sponsored by Intersect Alliance
WHITE PAPER: Learn how event logs, normally choked with superfluous white noise, can be used to zero in on suspicious behavior before it causes a breach.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Intersect Alliance

It’s Time for a “Protect From Within” Mentality
sponsored by Forcepoint
WEBCAST: It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast, "A Business Case for Funding Your Insider Threat Program,"for an in-depth look at how to establish an insider threat program and protect your organizations most important data.
Posted: 05 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

22 Ways Global Firms are Increasing Security in 2016 Webcast Part 2
sponsored by Intel Security
WEBCAST: Access this informative content to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.
Posted: 05 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Building a Vendor (IT) Risk Management Program
sponsored by BitSight
WHITE PAPER: Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.
Posted: 29 Jun 2016 | Published: 28 Apr 2016

BitSight

Securing Windows XP with Traps and Advanced Endpoint Protection
sponsored by Palo Alto Networks
PRODUCT LITERATURE: Uncover a way to continue using Windows XP while maintaining acceptable levels of security and compliance even though its end-of-life has passed.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

Palo Alto Networks

Interoperability and the Cloud in Connected Health
sponsored by CloudMine
WHITE PAPER: Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.
Posted: 29 Jun 2016 | Published: 29 Jun 2016


South Carolina Federal Credit Union Uses an ADC to Implement an SSL Environment
sponsored by Array Networks
CASE STUDY: When converting to an SSL-secured environment, your business must have the correct application delivery controller (ADC) employed to ensure server performance. Make an informed decision when selecting your ADC, by reading this case study which explains how one business benefitted from an ADC implementation.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Health Care Security Is Personal: Act Now to Protect Patient Care
sponsored by Optum
WHITE PAPER: In this white paper, learn how healthcare organizations can successfully manage vulnerabilities in today's ever-evolving threat landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.
Posted: 24 Jun 2016 | Published: 24 Jun 2016

Optum

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Survey Results: Wireless Security Trends
sponsored by Fortinet, Inc.
WHITE PAPER: Over half of 1,300 surveyed IT decision-makers revealed their preference for cloud-based wireless network management. Explore how to enable the segmentation of devices and access layers across wired/wireless networks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

The Advanced Threat Protection Buyer’s Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: Use the following checklist to help determine the strength of your security strategy. Access now and explore ways to make informed choices to move towards an integrated system of prevention, detection, and mitigation against advanced threats.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Advanced Threat Protection Buyer’s Guide
sponsored by Fortinet, Inc.
WHITE PAPER: To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc.
WHITE PAPER: Explore some of today's challenges in endpoint security and how desktop virtualization strategies can significantly reduce risks and improve protection at endpoints. You'll also examine real-world examples of organizations using desktop virtualization architectures with thin clients to enhance security.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Security Reference Blueprint for Industrial Control Systems
sponsored by Palo Alto Networks
WHITE PAPER: Targeted attacks against national, critical infrastructure are a serious threat that must be addressed with the highest priority, given how these systems are responsible for controlling critical services. Learn ways to reduce operational risks, prevent system breaches, and become compliant with both government and internal governance.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Palo Alto Networks

A Look Behind the Firewall
sponsored by Fortinet, Inc.
RESOURCE: Discover in this infographic how to diagnose your network performance based on traffic devoted to social media, audio, and video—and determine how this media may compromise your security. Read on to discover how to run a cyber-threat assessment to ensure your core business assets are well protected.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Protect and Distribute BYOD documents
sponsored by IBM
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Enterprise Email on Mobile Devices
sponsored by IBM
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM
51 - 75 of 857 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement