IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 766 Matches Previous Page  |  Next Page
The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

NIST Cybersecurity Framework Implementation Overview
sponsored by Absolute Software Corporation
WHITE PAPER: In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation.
Posted: 17 Feb 2020 | Published: 29 Oct 2018

Absolute Software Corporation

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

Fujitsu & VMware – Multi-Cloud Security
sponsored by Fujitsu
WEBCAST: In this video, Fujitsu & VMware experts offer insights, guidance, and solutions to overcome the challenges of cloud security to ensure your applications, workloads and data are ‘secure by design’ – whether at rest or in motion as you transform.
Posted: 13 Feb 2020 | Premiered: Dec 3, 2019

Fujitsu

Redefining security analytics with Chronicle Backstory
sponsored by Chronicle
WHITE PAPER: Today’s security teams face several challenges: from escalating threats and expanding networks and devices to the increased pressure of meeting security requirements. In this white paper, take a closer look at the 5 security requirements to include in your strategy and learn more about Chronicle’s Backstory data platform.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Collective Offense Calls for Collective Defense
sponsored by IronNet
WHITE PAPER: Advanced cybersecurity systems, such as AI and ML, are not preventing cyber incidents. Disparate efforts to thwart attacks are unlikely to remain sustainable as threats increase. Download this white paper and discover the collective defense platform: where security teams aggregate their threat intelligence to increase awareness and response time.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

IronNet

Cisco - From Privacy to Profit: Achieving Positive Returns on Privacy Investments
sponsored by Cisco Umbrella
WHITE PAPER: Privacy has become a critical business imperative, with organizations seeing significant ROI due to improvements in privacy and operational efficiency. Download this year’s Cisco Data Privacy Benchmark Study to take a closer look at the key findings around the benefits of data privacy.
Posted: 07 Feb 2020 | Published: 31 Jan 2020

Cisco Umbrella

Core - DNS - Network Security for SD-WAN
sponsored by Cisco Umbrella
WHITE PAPER: According to a 2019 study, 68% of security breaches involved branch offices and roaming users as the source of compromise. Download this white paper to find out how to deliver network security for today's evolving WAN networks and protect remote and roaming users.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

9 Steps to Success with Data Protection
sponsored by Forcepoint
RESOURCE: Data protection requires visibility of your network in order to understand where the likely risks lie and acting before they strike. As simple as it may sound, this can be a daunting task. These 9 steps will walk you through how to implement effective data protection controls. Read on to get started.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.
Posted: 05 Feb 2020 | Published: 07 Dec 2018

Absolute Software Corporation

SIG - Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: In this research readout, take a closer look at the top trends in remote and roaming user security throughout 2019 and explore the challenges of distributed environment security and the solutions best positioned to these challenges.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

The Value of Threat Intelligence
sponsored by DomainTools
WHITE PAPER: With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.
Posted: 05 Feb 2020 | Published: 30 Nov 2019

DomainTools

Continuous Risk Monitoring for Vulnerabilities
sponsored by ServiceNow
PRODUCT DEMO: In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.
Posted: 05 Feb 2020 | Premiered: 04 Dec 2019

ServiceNow

Australian Insurance provider establishes comprehensive risk management program
sponsored by ServiceNow
CASE STUDY: In this case study, follow the journey of MLC Life Insurance, a leading Australian insurance provider, as they partner with ServiceNow to develop & implement a comprehensive digital strategy that enables them to enhance customer experience while establishing governance, risk & compliance controls.
Posted: 05 Feb 2020 | Published: 30 Nov 2018

ServiceNow

The IT Director's Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: When it comes to managing cybersecurity, IT leaders & their teams are at a disadvantage: As threat methods are increasing in frequency & complexity, security teams must ensure protection with limited resources. Download this checklist as you develop your cybersecurity strategy & make effective use of existing resources.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Arctic Wolf Networks, Inc.

Complexity in Cybersecurity Report 2019
sponsored by IBM
WHITE PAPER: The evolving nature of security has led organizations to adopting a wide array of disjointed security tools. This overly siloed environment leads to complexity, which ultimately affects overall security efficacy. In this report, uncover results from a Forrester study into the current state of security complexity & the effect it’s having.
Posted: 04 Feb 2020 | Published: 31 May 2019

IBM

Cyber Threat Intelligence
sponsored by DomainTools
RESOURCE: As cyberattacks become more sophisticated and difficult to detect, proactive approaches to threat management are no longer viable for ensuring network security. In this solution brief, discover a proactive approach to threat intelligence that helps you identify & monitor threats while building a cyber threat database.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

DomainTools

2019 Cybersecurity Report Card
sponsored by DomainTools
WHITE PAPER: If you only pay attention to the massive data breaches that make headlines, it’s easy to draw the conclusion that cybersecurity is in a state of constant failure. However, there is enough going on behind the scenes to inspire confidence. Download this Cybersecurity Report Card to see how organizations rate their security posture.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

DomainTools

Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
sponsored by DomainTools
WHITE PAPER: As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

DomainTools

SIEM Buyer’s Guide
sponsored by DomainTools
WHITE PAPER: SIEM programs have become a critical part of the way organizations are able to monitor their network and mitigate potential risks. Is your organization interested in SIEM? Download this buyer’s guide and take a closer look at what defines SIEM, who uses it and an evaluation checklist for selecting the right solution.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

DomainTools

How to Build Out Your Cybersecurity Technology Stack
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: For organizations beginning their journey towards establishing a cybersecurity program, there can be an overwhelming number of vendors to choose from. This white paper is designed to guide organizations as they begin their selection process by providing advice for what to look for when evaluating vendors and service providers.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Government Agency Embraces Domain Intelligence to Pre-emptively Block Threats
sponsored by DomainTools
CASE STUDY: In this case study, discover how a major metropolitan government agency was able to incorporate a platform that enabled them to anticipate & block threats before they breach the perimeter and utilize their existing data to improve their collective intelligence to optimize IT resources. Download the report to take a closer look.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

DomainTools

Insider Data Breach survey 2019
sponsored by Egress Software Technologies Inc
WHITE PAPER: Despite thoughtful efforts to protect and secure data, insider threats are increasing, putting organizations at serious risk of data loss. In a recent study, Egress partnered with Opinion Matters to better understand insider threats sentiment from the perspective of both employees & IT leaders. Read on to uncover the results.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Egress Software Technologies Inc

Stay out of the Headlines
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Cyberattack detection & prevention is critical to maintaining an organization’s network. Too often, data breaches leave an organization and its customers devastated. In this white paper, explore the modern tactics and technologies being used by organizations to avoid headlines and other negative effects of cyberattacks.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Arctic Wolf Networks, Inc.

A CISO’s Guide to Hybrid Cloud Security
sponsored by vArmour
WHITE PAPER: Today’s organizations are adopting cloud at an unprecedented rate to bolster their business operations. As a result, CISOs & their security teams struggle to keep pace with providing data protection and compliance. Download this guide to discover how to achieve continuous security and compliance across hybrid cloud environments.
Posted: 29 Jan 2020 | Published: 29 Jan 2020

1 - 25 of 766 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info