Hardware  >  

Security Hardware

RSS Feed   
DEFINITION: Computer hardware that is designed to protect its contents from attack.
Security Hardware White Papers (View All Report Types)
1 - 25 of 92 Matches Previous Page  |  Next Page
Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

Extending DLP to the Cloud
sponsored by InteliSecure
WHITE PAPER: Uncover how your organization can protect its data on the cloud through the use of data loss prevention (DLP).
Posted: 24 May 2017 | Published: 24 May 2017

InteliSecure

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Cloud Computing Top Threats
sponsored by HPE and Intel® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and Intel® Corporate

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

The Promise and Risk of the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: Discover how operational tech like centrifuges and electrical grids can ensure robust security with IT/OT convergence efforts, create a foundation for greater cost and process efficiencies, gain a competitive edge derived from harnessing the power of the industrial Internet of Things, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

MSSPs: Benefits, Challenges and Trends
sponsored by AlienVault
WHITE PAPER: Discover the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource, their security programs.
Posted: 25 May 2017 | Published: 25 May 2017

AlienVault

Improve Your Threat Intel Capabilities
sponsored by Bayshore Networks
WHITE PAPER: Learn how to deploy comprehensive threat intel protection and enablement capabilities, gaining a policy engine that automatically converts threat intel feeds into actionable policy, and more.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Defend Against New Security Threats to Your Data Center
sponsored by Bayshore Networks
WHITE PAPER: Discover how to defend your enterprise against the security challenges surrounding operational technology (OT) equipment required to support and maintain the modern data center.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks
1 - 25 of 92 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement