IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure White Papers (View All Report Types)
101 - 125 of 660 Matches Previous Page  |  Next Page
Cloud Best Practices: Audit Checklist for Endpoint Security
sponsored by MobileIron
WHITE PAPER: This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint.
Posted: 15 May 2018 | Published: 15 May 2018

MobileIron

Considerations When Choosing the Best Strong Authentication Approach
sponsored by HID Global
WHITE PAPER: Discover the variables that should be considered when choosing the best authentication solution for your organization.
Posted: 14 May 2018 | Published: 14 May 2018

HID Global

A Layman's Guide on How To Operate Your SIEM Under The GDPR
sponsored by Splunk
WHITE PAPER: Click inside to get a general introduction to the GDPR, especially focused around the aspects most important to log management. Then discover some specific compliance guidance and use cases for network and information security logs.
Posted: 11 May 2018 | Published: 11 May 2018

Splunk

A Holistic Approach to Identity and Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase so does the potential for breaches via your physical and technology access points. Learn about identity and authentication tools to ensure your enterprise is fully protected.
Posted: 11 May 2018 | Published: 11 May 2018

HID Global

Telecom Providers: Improve your Subscribers' Experience
sponsored by Vitria Technology, Inc.
WHITE PAPER: To help improve customer experience, learn how telecom providers can reduce the time from the start of service incidents to issue resolution by accelerating each phase of the incident lifecycle using an effective analytics strategy.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Vitria Technology, Inc.

3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER: In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018

Illusive Networks

How to Respond to a Worst-Case Cyber Scenario
sponsored by CrowdStrike
WHITE PAPER: Explore recommendations for responding to a breach, the expertise required to do so quickly and effectively, and why companies need to be prepared to identify, respond to and mitigate a targeted attack.
Posted: 16 May 2018 | Published: 16 May 2018

CrowdStrike

Sifting Through Endpoint Security Hype and Reality
sponsored by NSS Labs
WHITE PAPER: Access this 13-page NSS Labs white paper to gain a better understanding of the newer classes of endpoint detection and response (EDR) and advanced endpoint protection (AEP) products. Determine what endpoint tools are best for your enterprise security needs.
Posted: 16 May 2018 | Published: 16 May 2018

NSS Labs

How to Detect Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Explore two analytical strategies that can help you detect unknown malware activity and early signs of compromise in a Windows environment. Discover how these approaches work in real-time to detect advanced threats faster.
Posted: 11 May 2018 | Published: 11 May 2018

Splunk

Drive Visibility into the Devices Connected to your Network
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: If you can't see an unauthorized or noncompliant device on your network, you can't defend against it. Find out how to drive visibility into the devices on your network, without requiring software agents or previous device knowledge.
Posted: 10 May 2018 | Published: 31 Dec 2017

ForeScout Technologies, Inc.

How to secure cloud and software-defined data centers
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Find how you can meet the added security challenges that stem from increasing virtualization with unified visibility and automated, policy-based controls across your physical and virtual infrastructure.
Posted: 10 May 2018 | Published: 31 Dec 2017

ForeScout Technologies, Inc.

A Modern Approach to Securing Hybrid Clouds
sponsored by Cavirin
WHITE PAPER: According to Gartner, through 2020, 95% of cloud breaches will be due to customer misconfiguration, mismanaged, credentials, or insider theft, not cloud provider vulnerabilities. This 35-page white paper explores a modern approach to securing hybrid clouds.
Posted: 08 May 2018 | Published: 08 May 2018

Cavirin

10 Steps to Proactive Security
sponsored by Solarwinds MSP
WHITE PAPER: Growing cybersecurity threats mean that your servers are more at risk than ever before. It's time to get proactive about protecting your customer data. Click inside this white paper to find 10 steps to help you get there.
Posted: 08 May 2018 | Published: 08 May 2018

Solarwinds MSP

Reimaging your Business Mean Imagining the Risk and the Mitigating it
sponsored by Advanced
WHITE PAPER: Access this white paper to learn how to best prepare to mitigate risk throughout your digital transformation journey.
Posted: 03 May 2018 | Published: 03 May 2018

Advanced

It's Time for a Smarter Approach: Threat-Centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 02 May 2018 | Published: 02 May 2018

Skybox Security

Helping Address Your GDPR Needs
sponsored by Oracle Cloud
WHITE PAPER: Failing to secure your data is a risk that no organization should be willing to take. Access this resource to find out how your technology can be used to implement a robust security framework to help you address GDPR requirements.
Posted: 30 Apr 2018 | Published: 30 Apr 2018

Oracle Cloud

The Notifiable Data Breach Scheme
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the contents and implications of recent Australia's notifiable data breach (NDB) scheme, and explore some of the key network security challenges posed by its reporting and regulatory burden.
Posted: 23 Apr 2018 | Published: 30 Dec 2016

Fortinet, Inc.

Helping Address GDPR Compliance
sponsored by Oracle Cloud
WHITE PAPER: This white paper explores how to address GDPR with a coordinated strategy built to identify threats, reduce risk, and maintain continuous compliance. Learn about a variety of security tools, stationed both on-premise and in the cloud, that are designed to help you discover, monitor, and encrypt sensitive data.
Posted: 05 Apr 2018 | Published: 31 Jul 2017

Oracle Cloud

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

5 critical mistakes when evaluating a next-generation firewall
sponsored by Palo Alto Networks
WHITE PAPER: Click inside to learn 5 common mistakes that occur when evaluating next-gen firewalls and how you can avoid them.
Posted: 16 Feb 2018 | Published: 31 Dec 2017

Palo Alto Networks

Unlock Business Opportunity without Taking Security Risks
sponsored by Juniper Networks
WHITE PAPER: This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Why ISO/IEC 27001 Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: Access this white paper to learn how privileged access management is critical to ISO/IEC 27001 compliance to establish, implement, maintain, assess and continually improve a robust information security management system (ISMS).
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics
101 - 125 of 660 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement