IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 659 Matches Previous Page  |  Next Page
Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018

Akamai Technologies

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Using Splunk Adaptive Response
sponsored by Splunk
WHITE PAPER: Adaptive response enables security analysts – from hunters to less skilled security staff – to better handle threats by speeding the time to make decisions and actions when responding and adapting to them. Read this white paper to learn about the adaptive response framework capabilities and adaptive response initiative partner integrations.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Splunk

2018 The State of the Internet / Security: A Year in Review
sponsored by Akamai Technologies
WHITE PAPER: This issue of the State of the Internet / Security report looks back at some of the events from 2018. 2018 was an interesting year for security professionals around the globe. In this white paper, review the major events that took place to help you plan for 2019.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Akamai Technologies

Unlocking B2B SaaS Growth with Identity Management
sponsored by Auth0
WHITE PAPER: Explore the role of identity management as well as, 3 ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Why Dwell Time Should Be Considered a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: In this white paper, learn why operations centered on Dwell Time - in their architectures, policies and processes - have an opportunity to make meaningful enhancements to their security strategy and maximize the investments made in their current security programs.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Armor

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

DNS Security for Financial Services
sponsored by Nominet
WHITE PAPER: Nearly 92% of malware uses DNS to gain command and control, exfiltrate data or redirect traffic, according to a CISCO report. So, protection at the DNS layer is crucial. Read this white paper to find out how to detect and stop DNS threats.
Posted: 12 Nov 2018 | Published: 12 Nov 2018


Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Dell SecureWorks

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

The DevOps Roadmap for Security
sponsored by Signal Sciences
WHITE PAPER: Download this e-book to learn how to extend the benefits of DevOps to security and how to embrace and implement modern DevSecOps principles, practices, and tooling.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Signal Sciences

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: To help your team be successful with testing, implementing and scaling automation, download this e-book for 4 security automation best practices.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Read this white paper to discover a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

F5 Networks

6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Why CASB alone isn't enough
sponsored by Open Systems
WHITE PAPER: When it comes to cloud-based workplaces, firewalls and traditional security tools may no longer be enough. Open this white paper to learn how Cloud Access Security Broker (CASB) closes that gap. Plus, come to know how CASB provides 4 critical security functions to allow for deeper visibility and inspection of cloud services.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Open Systems

Blockchain Applications for Identity Verification
sponsored by Evident
WHITE PAPER: Blockchain applications are constantly evolving and show promise for the identity world. Read on to explore 3 specific identity verification applications of digital ledger technology and where they align in the security world.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

Evident

Machine Learning Use Cases in Financial Crimes
sponsored by SAS
WHITE PAPER: Learn about 10 practical and achievable ways to put machine learning to work and ensure fraud detection efficiency.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

Is Your Growing Business Properly Securing Its Data?
sponsored by Evident
WHITE PAPER: Download this resource to learn the 3 steps you can take to implement a scalable security structure, and embrace flexible data management and verification processes to avoid a costly data breach as your business grows.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Evident

Transforming Security in the Mobile Cloud Era
sponsored by VMware
WHITE PAPER: Read this eBook to explore insights that can help you re-evaluate how your IT department approaches security in the mobile cloud era.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

VMware

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 29 Oct 2018 | Published: 31 Aug 2018

VMware

Critical Considerations for Choosing a Cloud Security Provider
sponsored by IBM Akamai
WHITE PAPER: Download this white paper to learn how you can augment your existing on-premises infrastructure with security measures in the cloud for a more robust web security posture, and explore 7 critical factors you should look for in a cloud security provider.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

IBM Akamai

Application Security and Performance
sponsored by IBM Akamai
WHITE PAPER: Web application and distributed denial of service (DDoS) attacks hit enterprises without warning or reason. Download this resource to discover how to protect against DDoS attacks and prevent operational disruption, loss of confidential data, lost user productivity, reputational harm, and more.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM Akamai

Top 10 Cloud Security Challenges
sponsored by Rackspace
WHITE PAPER: Cloud security is at the forefront of business agendas. Evolving security threats, new hacker methodologies, skills shortages and more are top-of-mind issues for CIOs. Download this resource today to discover 10 common concerns felt by CIOs and how you can approach and neutralize each.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Rackspace
1 - 25 of 659 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement