IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
76 - 100 of 1118 Matches Previous Page  |  Next Page
Giving IT a Secure, Common Platform for Extending the Data Center to the Cloud
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: IT must tailor security tools to protect public and hybrid cloud environments, allowing the enterprise to confidently extend their data center applications and workflows to the cloud and connect them securely. Access this white paper and uncover secure, dedicated cloud computing services.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Check Point Software Technologies Ltd.

Real World Security Risks Embedded In Your Cloud Strategy
sponsored by Blue Coat Systems
RESOURCE: Learn how to harness the cloud and mitigate the many risks associated with it. Discover how the cloud fits in with current IT industry trends, who is using the cloud (hint: over 50% of the Fortune 500), the top 3 cloud threats, and more.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Blue Coat Systems

Evaluation Checklist: Managed Security Services Provider
sponsored by Trustwave
WHITE PAPER: Discover what you should expect out of your next Managed Security Service Provider (MSSP) with this evaluation checklist. This tool will help you compare and contrast potential MSSP's so you can best decide which one best suits your needs
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

Managed Security Services Provider (MSSP) Decision Guide
sponsored by Trustwave
WHITE PAPER: What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

7 Steps to Protect Your Data Against Insider Threats
sponsored by Imperva
WHITE PAPER: Security teams can use this checklist to evaluate their current data security program and identify gaps pertaining to insider threats. Uncover a side-by-side list of ways to protect data and contain these threats.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Imperva

Threats and Mitigations: A Guide to Multi-Layered Web Security
sponsored by Akamai
EBOOK: Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Akamai

5 Ways to Achieve Big Data Protection
sponsored by Commvault
WHITE PAPER: Take a look at 5 key issues you must consider as you begin to embrace Big Data protection. Discover why organizations see Big Data protection as a huge challenge and learn the best strategies for protecting Big Data assets the same as you would "regular" data assets.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Commvault

Deliver Instant Web Experiences While Protecting Your Applications
sponsored by Akamai
WHITE PAPER: In this white paper learn how to meet the rising expectations of the always connected, globally-distributed end-users by delivering faster website and mobile app responses. Discover how your enterprise can defend against all types of DDoS and web application attacks at a high accuracy, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

The Security Champion's Guide to Web Application Security
sponsored by Akamai
WHITE PAPER: Learn about web application firewalls (WAFs) and how to apply them effectively such as considering whether a WAF is appropriate for your web application security, how to baseline your existing WAF against a set of recommended criteria, generate ideas for extending an existing WAF and improving web application security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.

Case Study: Cobweb Reduces Network Security Configuration Time from Hours to Minutes
sponsored by Forcepoint
CASE STUDY: Find out how Cobweb, a cloud solution provider, can automatically update their data centers, increase their bandwidth, add connections, and aggregate across network links safely and securely, giving multiple seamless failover options.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Forcepoint

Build a Defense-in-Depth Security Approach
sponsored by TrendMicro
WHITE PAPER: Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.
Posted: 14 Nov 2016 | Published: 01 Oct 2016

TrendMicro

Top 10 Security Advantages of One Business Management Platform
sponsored by Acumatica
RESOURCE: Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Acumatica

Overview: Modern Data Center Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Learn how to address these challenges with comprehensive and dynamic security for data centers. Uncover key capabilities of comprehensive threat prevention.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

Check Point Software Technologies Ltd.

Advanced Security for vCloud Air
sponsored by Check Point Software Technologies Ltd.
PRODUCT OVERVIEW: This white paper details a solution that provides comprehensive security tailored to protect hybrid cloud environments, so you can feel confident about extending your data center applications and workflows to the cloud.
Posted: 11 Nov 2016 | Published: 29 Feb 2016

Check Point Software Technologies Ltd.

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
sponsored by TrendMicro
WHITE PAPER: See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Comprehensive Security for Amazon Web Services
sponsored by Check Point Software Technologies Ltd.
PRODUCT OVERVIEW: This white paper discusses a solution that delivers comprehensive security tailored to protect cloud environments, allowing you to confidently extend your data center applications and workloads to the cloud. Learn how to protect your cloud now.
Posted: 11 Nov 2016 | Published: 30 Sep 2016

Check Point Software Technologies Ltd.

Case Study: Gain Real-Time Enterprise-Wide Visibility Into Site Operations
sponsored by Splunk
CASE STUDY: In this case study, learn now Zillow, a massive real-estate website, obtained crystal-clear operational visibility. Discover how it provides self-service abilities to teams to create custom solutions, ensures continuous website uptime, and is continually improving its incident isolation and mitigation abilities.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

Splunk

Top Benefits of Integrated Endpoint Protection
sponsored by TrendMicro
EGUIDE: When implementing endpoint security, is it better to buy standalone products or an endpoint security suite? Access this e-guide to learn the benefits of integrated endpoint protection software.
Posted: 11 Nov 2016 | Published: 10 Nov 2016

TrendMicro

Definitive Guide to Security Intelligence and Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: Security intelligence and analytics are key to uncovering and recovering from major cyberattacks. Learn how to be smart about detection and prevention, from surveying the cyberattack lifecycle to selecting the right security tool.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

LogRhythm, Inc.

Why Cybersecurity's Visibility Gap Matters and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the origins of the cybersecurity visibility gap, its consequences and how to expand your field of view. Learn how to protect your people, data and brand more effectively by bringing your security tools beyond your network perimeter.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

Proofpoint, Inc.

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

Combat Escalating Threats to Your Data Center
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how to provide industry-leading performance, scalability, resiliency, and accessibility to your data centers. Learn about modern security threats to your centers, the consequences of substandard or nonexistent security measures, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Juniper Networks, Inc.

Case Study: How zulily Gained Crystal Clear Visibility for Deep Insight
sponsored by Splunk
CASE STUDY: In this case study, learn how zulily, one of the world's fastest growing e-commerce sites, improved its business with complete visibility into its operations.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Splunk

A Step-By-Step Guide to Improving Application Insight
sponsored by Splunk
RESOURCE: In this getting started guide, discover how you can use Splunk software to better manage your enterprise's apps to ensure uninterrupted uptime, smooth out hiccups in performance, and more. Learn what causes these issues, common solutions, and more advanced approaches that can save your organization time, money, and effort.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Splunk
76 - 100 of 1118 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement