IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
1 - 25 of 645 Matches Previous Page  |  Next Page
You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Top 10 Cloud Security Challenges
sponsored by Rackspace
WHITE PAPER: Cloud security is at the forefront of business agendas. Evolving security threats, new hacker methodologies, skills shortages and more are top-of-mind issues for CIOs. Download this resource today to discover 10 common concerns felt by CIOs and how you can approach and neutralize each.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Rackspace

The DevOps Roadmap for Security
sponsored by Signal Sciences
WHITE PAPER: Download this e-book to learn how to extend the benefits of DevOps to security and how to embrace and implement modern DevSecOps principles, practices, and tooling.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Signal Sciences

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: To help your team be successful with testing, implementing and scaling automation, download this e-book for 4 security automation best practices.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

Application Security Evolved: How to Use Attacker-Centric Security to Fix the WAF
sponsored by ThreatX
WHITE PAPER: Download this white paper for a security team's guide to the current state of web application security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

ThreatX

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Akamai Cloud Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about Akamai's cloud-based approach to security that leverages 24/7 monitoring to collect and analyze terabytes of attack data, bot requests, and IP addresses to solidify your defenses. Plus, discover 7 keys to reducing your attack surface.
Posted: 12 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Mapping the Requirements of Next-Generation Sandboxing
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 7 key capabilities to look for in a next-gen sandboxing platform so that you can build a security architecture that's designed to detect and prevent threats before they can impact your network or your business as a whole.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

Cloud Security: Combat Threats to Your SaaS-Powered Business
sponsored by Arctic Wolf
WHITE PAPER: In today's rapidly evolving threat landscape, businesses require cybersecurity strategies that leverage capabilities delivered by a world-class SOC. Download this white paper to learn how you can establish a comprehensive security strategy for maximum protection.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Arctic Wolf

More is Not More: Busting the Myth that More Threat Intel Feeds Lead to Better Security
sponsored by ThreatConnect
WHITE PAPER: In this white paper, find out how to effectively evaluate a threat intel feed and how to use the DIKI pyramid to help decide which threat intel feeds are relevant to your organization.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

ThreatConnect

Six Multi-Cloud Myth Busters to Keep Businesses Secure
sponsored by Dimension Data
WHITE PAPER: Technological misconceptions are common among businesses, and can inadvertently prompt the wrong cloud implementation decisions. To avoid this happening within your company, read about 6 common multi-cloud myths and clear up any false information you may have learned.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Dimension Data

What SOC Managers Should Know about Security Orchestration and Threat Intelligence
sponsored by Siemplify
WHITE PAPER: Find out how security orchestration, automation, and response can empower security operations center teams to integrate data from disparate security systems for a more effective way to investigate and identify potential threats.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

Selecting a Security Orchestration Vendor
sponsored by Siemplify
WHITE PAPER: This white paper gives an overview of security orchestration, automation, and response technologies, providing you with the tools you need to evaluate vendors. As you select your system, discover which 6 features to look for.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: SIEMs are a powerful tool for collecting and correlating event data and have a well-deserved place within your security infrastructure. But, to truly shine they need to be supported by a cybersecurity platform. Read on to find out how your organization can enhance its SIEM with a cybersecurity platform, today.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

ThreatConnect

Technology Evaluation Centers: The Enterprise Mobility Report
sponsored by IFS
WHITE PAPER: With the continuation and growth of the BYOD trend, the idea that IT can successfully manage and control everyone's devices no longer works. Download this white paper to review research and trends about enterprise mobility management (EMM), which can help employees use personal devices securely.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

IFS

SOC-as-a-Service for Financial Institutions
sponsored by Arctic Wolf
WHITE PAPER: Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

No Business Is Too Small a Target for Hackers
sponsored by Arctic Wolf
WHITE PAPER: Find out how SMBs, despite the fact that they lack the resources and skilled experts that many of their larger contemporaries have, can step up their defense against hackers with measures like security operations center as a service (SOCaaS).
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

Malware or Maleficent? Take This Quiz to Find Out
sponsored by Cisco Umbrella
WHITE PAPER: Take this quiz to learn about a security platform that uses the internet's infrastructure to block malicious destinations before a connection is ever established.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Cybersecurity Essentials Every Law Firm Needs
sponsored by Arctic Wolf
WHITE PAPER: Organizations like law firms possess vast quantities of highly sensitive information that puts them at the top of hackers' hit lists. Learn about 5 essential security capabilities for protecting company and client data that every firm must have.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

SOC-as-a-Service for Cloud Infrastructures and SaaS Applications
sponsored by Arctic Wolf
WHITE PAPER: Find out how to overcome some of the top security challenges facing hybrid cloud architectures – from data exfiltration to insider threats – with a security operations center as a service (SOCaaS).
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

9 Metadata Network Security Use Cases
sponsored by Gigamon
WHITE PAPER: With some organizations running more than 2,000 unique applications and tools—which create terabytes of log data—finding anomalies can be difficult. Download this white paper to learn how Gigamon's security platform uses metadata from these applications to protect your organization, and explore use cases for metadata in security.
Posted: 05 Sep 2018 | Published: 31 Dec 2016

Gigamon

Rethinking Security Efficacy: How to Reduce and Manage Your Business Risk
sponsored by Citrix
WHITE PAPER: IT and security leaders are encountering ever-increasing levels of risk and exposure to breaches. Download this white paper to learn how to manage your security in the ever-changing digital environment and respond effectively to threats.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix
1 - 25 of 645 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement