IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureReports
76 - 100 of 705 Matches Previous Page  | Next Page
Secure Your Mobile Content While Increasing Productivity
sponsored by Accellion, Inc.
WHITE PAPER: This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Implement Next Generation Architecture to Protect Your Data
sponsored by arcserve
WHITE PAPER: This white paper explains trends and challenges that customers may have when facing issues with data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

arcserve

Competitive Testing of Web Security Devices
sponsored by Websense, Inc.
WHITE PAPER: This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.
Posted: 30 Jun 2014 | Published: 23 Jan 2014

Websense, Inc.

DDOS Secure - DDoS Mitigation for Your Network and Critical Applications
sponsored by Juniper Networks, Inc.
DATA SHEET: This resource stresses the importance of a fully automated application-layer of protection, and touches upon the necessary security architecture.
Posted: 27 Jun 2014 | Published: 30 Nov 2013

Juniper Networks, Inc.

Boosting your security against advanced persistent threats
sponsored by IBM
EGUIDE: This expert e-guide explains the necessary steps to take when developing a defense strategy for your network.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

The Definitive Guide to Next Generation Firewalls: Which One is Right for You?
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes an in-depth look at NGFWs, discussing five crucial "must-haves" for firewall success. Tune in now to find out more.
Posted: 23 Jun 2014 | Premiered: Jun 23, 2014

Fortinet, Inc.

Choose the Service Desk Delivery Model that Makes Sense
sponsored by Pangea Systems
WHITE PAPER: This white paper discusses three delivery models, including the benefits and considerations you must take when choosing the right model for your business.
Posted: 20 Jun 2014 | Published: 31 Dec 2012

Pangea Systems

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett-Packard Company

Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

The Evolution of the Enterprise and Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This informative paper examines how the enterprise has evolved and how your security needs to evolve with it. Read on to find out more about the current state of enterprise security.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Who Achieves 100% on NSS Data Center Firewall Security Testing
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive resource analyzes a firewall solution that has passed all stability, reliability, and firewall policy enforcement tests to ensure that your environment is as safe as it can be.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Surprising Research on the Evolving State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This resource aims to break the lingering assumption that the cloud is inherently less secure than an enterprise data center environment.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Alert Logic

Product Report Card: NSS Labs Evaluates FortiSandbox
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at a breach detection solution that identifies and mitigates any potential network threat or intrusion, allowing you to continue to provide the services your users need.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Fortinet, Inc.

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
WHITE PAPER: This white paper highlights the benefits of centralizing data on a single cloud platform to better protect today's decentralized IT infrastructure.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Box

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

76 - 100 of 705 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement