IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureReports
51 - 75 of 721 Matches Previous Page  | Next Page
Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

Protect Your Organization from DDoS Malware
sponsored by Verisign, Inc.
WHITE PAPER: Check out this valuable whitepaper now to learn about five specific types of DDoS attacks, how they work, what you can do to prevent them, and much more.
Posted: 28 Oct 2014 | Published: 09 Oct 2013

Verisign, Inc.

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This white paper explores the options for security systems for corporations who adopted cloud computing and virtualization. Read on to learn which security systems make the cut and which ones leave you vulnerable.
Posted: 24 Oct 2014 | Published: 31 Dec 2013

IBM

Security Information and Event Management Solutions
sponsored by TechTarget
RESOURCE: Choosing a SIEM solution can be a daunting task with so many options to consider. To help make your decision easier, IT Central Station has compiled this overview of the leading SIEM solutions along with reviews from your fellow IT Professionals. Find out what solution best fits your needs with this comprehensive guide.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget

How to Use Big Data Security Analytics to Protect Your Organization
sponsored by RSA
VIDEO: Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

RSA

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: View this white paper to explore an in depth comparison of cloud security solutions. Discover the pros and cons to each, who comes out on top, and who falls short. Read on to learn which security solution is right for your organization.
Posted: 22 Oct 2014 | Published: 05 Dec 2012

IBM

How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

How Alert Logic Helped BancBox to Protect Payment Information in the Cloud
sponsored by Alert Logic
WHITE PAPER: This white paper describes Alert Logic's collaboration with BancBox, a payment service provider, to find a way to protect payment information and meet PCI compliance mandates in a cloud environment.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Alert Logic

Cloud Migration Security Check
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

IDC Technology Spotlight Datacenter Security: Ensuring Protection at the Server Level
sponsored by Lenovo and Intel
WHITE PAPER: Explore the trends affecting data center server security, including trends influenced by the 3rd Platform of compute.
Posted: 14 Oct 2014 | Published: 01 Aug 2014

Lenovo and Intel

CW Buyer's Guide to Security Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

How to Eliminate Known Vulnerabilities with Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This exclusive IT download will let you try out a patch management solution that adds non-Microsoft third-party patch to Microsoft System Center Configuration Manager to maximize your investment in System Center and to reduce risks from unpatched third-party applications.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

Free Demo: Powerful and Easy-to-Use Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This complimentary IT download provides a hands-on demonstration of one solution that can patch desktops, data centers, virtual infrastructure and more.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

Delivering Threat Intelligence to Security Technology Providers and Large Organizations
sponsored by Webroot
WHITE PAPER: One of the best ways to address poor incident detection and incident response is with greater use of information-driven security based upon internal security analytics and external threat intelligence. So what technology and strategies do you need to enable this insight? Read this white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 08 Oct 2014 | Published: 10 Jul 2014

Red Hat

Big Data, Big Mess: Sound Cyber Risk Intelligence through “Complete Context”
sponsored by SurfWatch Labs
WHITE PAPER: The following white paper examines the common problem that faces many businesses when it comes to gleaning value from big data and offers insight into how to attain the "complete context" from you big data and how to leverage it for superior business value and benefits.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SurfWatch Labs

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Nasty Shadow IT Surprises for the Enterprise
sponsored by CipherCloud
RESOURCE: Check out this resource to learn about three shadow IT surprises that are capable of affecting your business.
Posted: 01 Oct 2014 | Published: 08 Sep 2014

CipherCloud

Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard
51 - 75 of 721 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement