IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 595 Matches Previous Page  |  Next Page
Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

How to Secure Data in the Cloud
sponsored by McAfee, Inc.
WHITE PAPER: Access this white paper to find out how to protect data where it increasingly lives today, in the cloud.
Posted: 03 Jul 2018 | Published: 03 Jul 2018

McAfee, Inc.

Vendor Risk Management Guide: The 3 Fundamentals
sponsored by CyberGRX
WHITE PAPER: This white paper explores the basic components of a complete vendor risk management (VRM) program.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CyberGRX

Application & Infrastructure Security Controls on the Kinvey Platform
sponsored by Progress Software, Inc.
WHITE PAPER: This white paper describes the security features of a mobile Backend as a Service (mBaaS) platform to help alleviate these security and privacy risks by isolating and protecting enterprise data sources and networks from client applications running on untrusted devices and their networks.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Progress Software, Inc.

Why You Should Take Security in the Cloud
sponsored by Splunk
WHITE PAPER: This white paper highlights the benefits of running a security analytics platform in the cloud and explores the power of big data analytics and cloud-based security.
Posted: 29 Jun 2018 | Published: 29 Dec 2017

Splunk

PIM, PAM and PUM: 2018 Fundamentals and Best Practices for Linux/Unix Privileged Identity and Access Management
sponsored by HelpSystems
WHITE PAPER: This white paper touches on the importance of PIM, PUM and PAM understanding and planning. Find out how you can transform your multi-vendor Linux and Unix server environment into one centrally managed security domain to simplify security policies and control access rights.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Arctic Wolf

Getting Ahead of the Compliance Curve
sponsored by DigiCert
WHITE PAPER: Available in this white paper, find out how to achieve a greater level of operational efficiency by adopting a proactive strategy and staying ahead of the compliance curve.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

DigiCert

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Akamai Technologies

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER: A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018

Akamai Technologies

5 Must-Ask DNS Questions
sponsored by Akamai Technologies
WHITE PAPER: Cybercriminals are evolving. They are capitalizing on the open and unprotected nature of the DNS to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are 5 things to ask yourself as you consider a DNS security solution for your company.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

Akamai Technologies

How Securing Recursive DNS Proactively Protects Your Network
sponsored by Akamai Technologies
WHITE PAPER: Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy, most IT departments still fail to explicitly protect the Domain Name System (DNS). Discover why this Internet protocol doesn't have to be a vulnerability.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

Akamai Technologies

The Black Market Report: A Look Inside the Dark Web
sponsored by Armor
WHITE PAPER: This Black Market Report reveals a snapshot of the type of activity threat actors are participating in every day, as well as valuable insights into what type of tools and services are popular among criminals.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Armor

SOC: Build It or Buy It?
sponsored by Armor
WHITE PAPER: This white paper breaks down staff roles and responsibilities, technology requirements and associated costs, so your organization can operate a successful SOC whether you decide to build it or buy it.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Armor

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

Akamai Technologies

The Container Ecosystem: Why Full Stack Container Security Makes Sense
sponsored by Cavirin
WHITE PAPER: Find out the benefits of a full-stack container security approach, so you confidently continue to use containers as the building blocks in any development stage.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Cavirin

New Criteria for Today's SIEM
sponsored by Splunk
WHITE PAPER: This white paper explores key capabilities to consider when evaluating a new SIEM – or re-evaluating a legacy SIEM against today's requirements.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

Splunk

Securing Cloud Collaboration
sponsored by Vera
WHITE PAPER: Find out how you can confidently secure cloud collaboration platforms and move forward with your digital transformation goals.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

Vera

Cloud Platform Security and Monitoring
sponsored by ReliaQuest
WHITE PAPER: Download this resource for 3 steps improve security and monitoring of AWS, Microsoft Azure, and Google Cloud Platform and secure your enterprise data.
Posted: 07 Jun 2018 | Published: 07 Jun 2018


Aruba 360 Secure Fabric: A User-centric Approach to Network Security
sponsored by Aruba Networks
WHITE PAPER: Find out how network business decision-makers, CISOs, and other network security leaders can get involved and meet the challenges of mobile, cloud, and IoT head-on.
Posted: 07 Jun 2018 | Published: 31 Mar 2018

Aruba Networks

Know Your Enemy: The Role of Big Data, Crowdsourcing and Machine Learning in Cyber-Security
sponsored by Radware
WHITE PAPER: In this white paper, learn about the role of big data, crowdsourcing and machine learning in cybersecurity, and find out why data is key to knowing your enemy.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Radware

The Executive Guide to Demystifying Cybersecurity
sponsored by Radware
WHITE PAPER: Inside, find out what banks and cybersecurity have in common and learn several ways of protecting and monitoring valuable information.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

Combating the Top Five Cyberattacks with Managed Detection and Response
sponsored by Arctic Wolf
WHITE PAPER: This white paper walks through the top 5 security attacks, by providing insights into tactics, techniques and procedures commonly used by threat actors. Then, find out how a managed detection and response strategy can take your security protocols to the next level and protect your organization.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Arctic Wolf

Analyzing the OWASP Top 10: Top Application Security Threats & How to Mitigate Them
sponsored by Radware
WHITE PAPER: Inside, explore an overview of changes between the 2013 and 2017 top 10 list, serving as an industry benchmark for the application security community. Uncover technical capabilities security pros should consider when evaluating web application firewalls.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

Only You Can Prevent Ransomware, Instead of Falling Victim to It
sponsored by Cylance
WHITE PAPER: This white paper can help enterprises better understand the current threat landscape and how to stay protected against growing ransomware attacks.
Posted: 01 Jun 2018 | Published: 01 Jun 2018

Cylance
1 - 25 of 595 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement