IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1212 Matches Previous Page  |  Next Page
Cloud Security Foundations
sponsored by Forcepoint
VIDEO: In this webinar, ESG Senior Analyst Doug Cahill will discuss cloud trends and how deploying enterprise-class data loss prevention and cloud access security brokers solutions together can provide key value for your business.
Posted: 17 Sep 2018 | Premiered: 06 Sep 2018

Forcepoint

Building a Smart City Starts with Security
sponsored by One Identity
CASE STUDY: Smart-city technologies support exciting innovations while improving quality of life for citizens. But, with more sensors collecting data in the field, comes greater security risks. Find out how one city was able to develop their smart capabilities while mitigating security risks.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Bringing Security Architecture Into the Light – the Inherent Value of Transparency and Diagnostics
sponsored by Empow Cyber Security
RESOURCE: Many CISOs deal with the daily frustration of uncertainty with the performance of their security products in their organization's arsenal. Find out how empow's new Security Diagnostics Service can shed the light on your organization's security and help eliminate this daily issue.
Posted: 14 Sep 2018 | Published: 24 Apr 2017

Empow Cyber Security

Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

The Most Simple Way To Secure AWS Environments
sponsored by Cyxtera
RESOURCE: Learn how this company secured its AWS environments and simplified its authentication methods with a software-defined perimeter.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Cyxtera

Deconstructing a Modern Bank Heist: the [not] Carbanak Source Code Leak
sponsored by Illusive Networks
RESOURCE: In August 2018, part of the source code leaked for Buhtrap/Ratopak/Pegasus malware threats – creating a rare opportunity to see how these attacks work and are executed by bad actors. This resource analyzes the leaked source code and takes a look at how it sneaks through network defenses.
Posted: 12 Sep 2018 | Published: 03 Aug 2018

Illusive Networks

Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
sponsored by Arctic Wolf
WEBCAST: Watch this upcoming webinar to learn the essential components needed to defend your business against the top 5 attack vectors we see in a Cyber Security Operations Center (SOC).
Posted: 12 Sep 2018 | Premiered: Sep 12, 2018

Arctic Wolf

Donnelley Financial Solutions Case Study
sponsored by Empow Cyber Security
CASE STUDY: Discover how Donnelley Financial Solutions, a global financial risk and compliance provider, was able to meet its security and compliance objectives after adopting a new SIEM strategy.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Empow Cyber Security

Deception: The Security Strategy That Every IT Team Should Be Using
sponsored by Illusive Networks
RESOURCE: In this resource, find out what Illusive Labs learned about cybercriminals and their use of open source intelligence to infiltrate networks and move laterally through a system.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Illusive Networks

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
EBOOK: Whether your organization is currently SIEM-less, or you're exasperated by your current SIEM, trying to find the right SIEM solution can be overwhelming. Download this guide for practical advice on choosing your first (or next) SIEM.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Rapid7

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Quarterly Threat Report
sponsored by Rapid7
RESEARCH CONTENT: In this 2018 Q2 review, get a clear picture of the threat landscape within your unique industry, how these threats have changed, and what to expect for the rest of the year.
Posted: 11 Sep 2018 | Published: 21 Aug 2018

Rapid7

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Cloud Networking: What Every IT Pro Needs To Know
sponsored by SearchNetworking.com
EBOOK: Speed or security? Cloud networking often requires balancing the two. Read this handbook to learn how you can have both speed and security.
Posted: 10 Sep 2018 | Published: 14 Sep 2018

SearchNetworking.com

Secure your Office 365 Environment
sponsored by Forcepoint
RESOURCE: Driving Office 365 adoption is an important goal—87% of IT professionals say it's a top priority. Yet, few have fully migrated their users and apps due to concerns around security and compliance. Download this e-book to learn how Forcepoint protects Office 365 and your expanding cloud environment.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Forcepoint

SOC-as-a-Service for Financial Institutions
sponsored by Arctic Wolf
WHITE PAPER: Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

No Business Is Too Small a Target for Hackers
sponsored by Arctic Wolf
WHITE PAPER: Find out how SMBs, despite the fact that they lack the resources and skilled experts that many of their larger contemporaries have, can step up their defense against hackers with measures like security operations center as a service (SOCaaS).
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

Malware or Maleficent? Take This Quiz to Find Out
sponsored by Cisco Umbrella
WHITE PAPER: Take this quiz to learn about a security platform that uses the internet's infrastructure to block malicious destinations before a connection is ever established.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Find out if ransomware poses a big threat to you
sponsored by Cisco Umbrella
EBOOK: Ransomware is one of the most pressing threats in today's business world, and successful attacks can cost organizations hundreds of thousands of dollars. Take this quiz to learn more about ransomware threats and find out if your organization is at high risk.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Understanding Office 365 Security Concerns
sponsored by Forcepoint
RESEARCH CONTENT: Read this white paper for a look at the Office 365 adoption trend, security teams' greatest priorities and concerns, and how they are planning to tackle them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Forcepoint

Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

Vendor Breakdown: Which Secure Email Gateway is Right for You?
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: Security and risk management leaders continue to rely on the secure email gateway (SEG) as a critical component of their security strategy in an evolving threat environment. But which SEG is the right one for you? Download this Gartner Market Guide for SEGs to compare vendor capabilities and see which tool is best for your organization.
Posted: 07 Sep 2018 | Published: 03 May 2017

Proofpoint, Inc.
1 - 25 of 1212 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement