IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 550 Matches Previous Page  |  Next Page
Helping Address GDPR Compliance
sponsored by Oracle Cloud
WHITE PAPER: This white paper explores how to address GDPR with a coordinated strategy built to identify threats, reduce risk, and maintain continuous compliance. Learn about a variety of security tools, stationed both on-premise and in the cloud, that are designed to help you discover, monitor, and encrypt sensitive data.
Posted: 05 Apr 2018 | Published: 31 Jul 2017

Oracle Cloud

Testing Endpoint Security: An Introductory Guide
sponsored by Sophos
WHITE PAPER: In this 25-page white paper, explore how to successfully test endpoint security software. Find out how testing a wide range of features in multiple scenarios is the best way to have clarity on how effective an endpoint security product can be against the advances that attackers have made in recent years.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Sophos

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017

Radware

Security Trends: Data Theft and Ransomware Plague Healthcare Organizations
sponsored by IBM
WHITE PAPER: According the Cost of a Data Breach Study, the healthcare industry's data breach cost, $355 per record, is more than twice the mean across all industries of $158 per record. Inside this resource uncover how to protect your healthcare organization while reducing cost and complexity and proactively hunt and respond to threats.
Posted: 02 Mar 2018 | Published: 31 Dec 2016

IBM

Telecom Providers: Improve your Subscribers' Experience
sponsored by Vitria Technology, Inc.
WHITE PAPER: To help improve customer experience, learn how telecom providers can reduce the time from the start of service incidents to issue resolution by accelerating each phase of the incident lifecycle using an effective analytics strategy.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Vitria Technology, Inc.

3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER: In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018

Illusive Networks

5 Critical Mistakes to Avoid When Evaluating a Next-Gen Firewall
sponsored by Palo Alto Networks
WHITE PAPER: Click inside to learn 5 common mistakes that occur when evaluating next-gen firewalls and how you can avoid them.
Posted: 16 Feb 2018 | Published: 31 Dec 2017

Palo Alto Networks

Unlock Business Opportunity without Taking Security Risks
sponsored by Juniper Networks
WHITE PAPER: This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Monitoring Industrial Control Systems to Improve Operations and Security
sponsored by SecurityMatters
WHITE PAPER: Industrial Control Systems (ICS) sit at the core of every industrial process. This white paper details the pros and cons of several existing technologies that can be employed to monitor and protect ICS networks allowing organizations to best understand their environment and threat exposure throughout the entire security lifecycle.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

SecurityMatters

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics

Stop the Cybersecurity Guessing Game
sponsored by NSS Labs
WHITE PAPER: According to Gartner, security spending keeps growing and it will increase by 26% in the next 3 years. However, many organizations are unclear of how secure they really are. Access this white paper to uncover how to address the unmitigated risks created by today's threats.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

NSS Labs

Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Modern IAM: Build Trust Without Sacrificing Security
sponsored by CA Technologies
WHITE PAPER: This white paper outlines how a modern identity and access management system can help build trust between yourself and your users without infringing on their freedom.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

CA Technologies

Unified Threat Management (UTM) Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Fortinet, Inc.

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM
sponsored by Splunk
WHITE PAPER: Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Splunk

Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

The Essential Guide to Securing Remote Access
sponsored by Duo Security
WHITE PAPER: New threats center on gaining remote access to your apps and data – whether it's with stolen passwords or exploited known vulnerabilities targeting out-of-date devices. Access this resource to uncover the different threats, using real-world examples, and uncover security best practices to help your organization maintain secure remote access.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

Synopsys

Check Point and Silver Peak Securing the Internet for SD-WAN
sponsored by Silver Peak
WHITE PAPER: Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.
Posted: 28 Nov 2017 | Published: 31 Dec 2016

Silver Peak

Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER: In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7
1 - 25 of 550 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement