IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1116 Matches Previous Page  |  Next Page
Threat Hunting eBook
sponsored by Digital Guardian
RESOURCE: Cyberthreat hunting is the new threat management. Access this e-book for a step-by-step guide on how to stay on top of the ever evolving threat landscape.
Posted: 18 Jul 2018 | Published: 31 Dec 2016

Digital Guardian

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018


Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

McAfee Skyhigh Security Cloud for Office 365
sponsored by McAfee, Inc.
RESOURCE: Use this resource to take an in-depth look at McAfee Skyhigh Security Cloud for Office 365 to help your organization securely accelerate your business by providing total control over data and user activity.
Posted: 03 Jul 2018 | Published: 03 Jul 2018

McAfee, Inc.

How to Secure Data in the Cloud
sponsored by McAfee, Inc.
WHITE PAPER: Access this white paper to find out how to protect data where it increasingly lives today, in the cloud.
Posted: 03 Jul 2018 | Published: 03 Jul 2018

McAfee, Inc.

Keeping SIEM Simple and Actionable
sponsored by Fortinet, Inc.
WEBCAST: Security information and event management (SIEM) tools can be extremely effective for managing security, performance and compliance. However, SIEMs can often be too complex to be used effectively. Listen in on the webcast to learn how to keep your SIEM simple and actionable
Posted: 03 Jul 2018 | Premiered: Jul 3, 2018

Fortinet, Inc.

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

ThreatX

Worldwide Cloud Security Gateways Vendor Assessment
sponsored by McAfee, Inc.
RESEARCH CONTENT: As enterprises lose control over the different architectural components of the cloud, more uncertainty is introduced into the environment, and organizations must rethink their security programs. Learn about the key characteristics for a cloud security platform, from this IDC vendor assessment.
Posted: 02 Jul 2018 | Published: 29 Dec 2017

McAfee, Inc.

Vendor Risk Management Guide: The 3 Fundamentals
sponsored by CyberGRX
WHITE PAPER: This white paper explores the basic components of a complete vendor risk management (VRM) program.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CyberGRX

McAfee Skyhigh Security Cloud for Amazon Web Services
sponsored by McAfee, Inc.
RESOURCE: Moving to a cloud-based environment can be intimidating as cyber attacks continue to grow. Use this resource to take an in-depth look at McAfee Skyhigh Security Cloud or AWS, a monitoring, auditing and remediation tool for your AWS environment.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

McAfee, Inc.

How to Avoid the Top 3 Pitfalls of Reputation-Based WAF's
sponsored by ThreatX
RESOURCE: Explore 3 common pitfalls of IP/reputation blacklist feeds and how you can avoid them.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

ThreatX

Application & Infrastructure Security Controls on the Kinvey Platform
sponsored by Progress Software, Inc.
WHITE PAPER: This white paper describes the security features of a mobile Backend as a Service (mBaaS) platform to help alleviate these security and privacy risks by isolating and protecting enterprise data sources and networks from client applications running on untrusted devices and their networks.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Progress Software, Inc.

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Stop Losing Sleep (or Money) Over a Potential Breach
sponsored by Fortinet, Inc.
WEBCAST: What's keeping you up at night? For 46% of organizations, a talent shortage to fight cybersecurity is at the top of the list. Join this webinar to understand breach technology and the shift that is occurring beyond just detection, so your organization can get the sleep it needs.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Fortinet, Inc.

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Fighting Cybercrime with Artificial Intelligence
sponsored by Fortinet, Inc.
WEBCAST: What will the role of AI be in fighting cybercrime? Listen in as SANS analyst, Dave Shackleford, digs into a specific implementation of a deep learning system to do just that.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Fortinet, Inc.

Why You Should Take Security in the Cloud
sponsored by Splunk
WHITE PAPER: This white paper highlights the benefits of running a security analytics platform in the cloud and explores the power of big data analytics and cloud-based security.
Posted: 29 Jun 2018 | Published: 29 Dec 2017

Splunk

PIM, PAM and PUM: 2018 Fundamentals and Best Practices for Linux/Unix Privileged Identity and Access Management
sponsored by HelpSystems
WHITE PAPER: This white paper touches on the importance of PIM, PUM and PAM understanding and planning. Find out how you can transform your multi-vendor Linux and Unix server environment into one centrally managed security domain to simplify security policies and control access rights.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

How to Protect Against the Top 5 Cyberattacks
sponsored by Arctic Wolf
WHITE PAPER: Find out why many existing security practices struggle to keep up with 5 of the leading cyberthreats, and learn about the important roles played by a security operations center and customized threat detection in maintaining compliance.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Arctic Wolf

The Truth About Cloud Security
sponsored by HelpSystems
EBOOK: According to LinkedIn Group Partner's Cybersecurity Trends 2017 Spotlight Report, only 53% of respondents said they would be able to resist cyber threats in their cloud infrastructure and apps. This e-book explores the importance of routinely evaluating your cloud security environment to ensure the proper settings and precautions are in place.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

Are Your Defenses Against Web Application Attacks Falling Further Behind?
sponsored by ThreatX
RESEARCH CONTENT: Dive into this 11-page Frost & Sullivan Report to learn why web applications are under attack, the costs associated with an attack and how you can revamp your current web application firewall strategy to continue your business engagements with confidence.
Posted: 28 Jun 2018 | Published: 30 Jun 2018

ThreatX

Getting Ahead of the Compliance Curve
sponsored by DigiCert
WHITE PAPER: Available in this white paper, find out how to achieve a greater level of operational efficiency by adopting a proactive strategy and staying ahead of the compliance curve.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

DigiCert

The Impact of GDPR Even if You're Not in the EU
sponsored by Fortinet, Inc.
WEBCAST: Listen in on this informative webcast to learn more about what GDPR compliance means for organizations not located in the EU and how network security technologies come into play with GDPR.
Posted: 26 Jun 2018 | Premiered: Jun 26, 2018

Fortinet, Inc.

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Akamai Technologies
1 - 25 of 1116 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement