IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 1282 Matches Previous Page  |  Next Page
Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Securing Open Source, Part 1 & 2
sponsored by WhiteSource
RESEARCH CONTENT: In this report, explore how the boom in open source software (OSS) has led to an increased awareness of open source risks, from licensing issues to security – and the measures that are required to protect organizations against those risks.
Posted: 08 Jan 2019 | Published: 07 Sep 2018

WhiteSource

Trusted App Protection From a Leader in WAF
sponsored by F5 Networks
PRODUCT OVERVIEW: Download this white paper to learn about F5's Advanced WAF that is designed to offer superior protections against the latest credential threat and abuse.
Posted: 21 Dec 2018 | Published: 21 Dec 2018

F5 Networks

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018

Akamai Technologies

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Take Your Security to the Next Level
sponsored by Splunk
PRODUCT OVERVIEW: Learn how you can augment your security initiatives and practices through automation and adaptive response.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Splunk

Using Splunk Adaptive Response
sponsored by Splunk
WHITE PAPER: Adaptive response enables security analysts – from hunters to less skilled security staff – to better handle threats by speeding the time to make decisions and actions when responding and adapting to them. Read this white paper to learn about the adaptive response framework capabilities and adaptive response initiative partner integrations.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Splunk

2018 The State of the Internet / Security: A Year in Review
sponsored by Akamai Technologies
WHITE PAPER: This issue of the State of the Internet / Security report looks back at some of the events from 2018. 2018 was an interesting year for security professionals around the globe. In this white paper, review the major events that took place to help you plan for 2019.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Akamai Technologies

Balancing Digital Experience and Security
sponsored by Akamai Technologies
RESOURCE: As organizations seek to improve customer experiences, they must enable increasingly fast, streamlined, simple and safe digital experiences. This executive summary aims to help readers understand how digital businesses across the globe align user experience and security with their strategic priorities.
Posted: 17 Dec 2018 | Published: 31 Mar 2018

Akamai Technologies

Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Swimlane

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Zero Trust Threat Prevention, Q3 2018
sponsored by Cyxtera
RESEARCH CONTENT: This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support Zero Trust threat prevention. Read on to find out which one is the best for your organization.
Posted: 03 Dec 2018 | Published: 12 Jul 2018

Cyxtera

Unlocking B2B SaaS Growth with Identity Management
sponsored by Auth0
WHITE PAPER: Explore the role of identity management as well as, 3 ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Armor Complete: Technical Solution Brief
sponsored by Armor
RESOURCE: Learn about secure cloud hosting platform and how it could help your organization reduce the burden of security without compromising it.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Armor

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT: Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Illusive Networks

Why Dwell Time Should Be Considered a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: In this white paper, learn why operations centered on Dwell Time - in their architectures, policies and processes - have an opportunity to make meaningful enhancements to their security strategy and maximize the investments made in their current security programs.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Armor

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

The Elevation of Security
sponsored by HP
EBOOK: We live in the era of digital disruption, when always-on connectivity, a mobile workforce and globalization leave us more vulnerable than ever to cybersecurity assaults. Access this 28-page e-book to grasp a better understanding of how to detect and prevent security attacks in this changing world.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

HP

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Are You Monitoring and Protecting Your Company's Digital Footprint?
sponsored by Proofpoint, Inc.
EBOOK: Although your digital presence is critical to providing a cohesive customer experience, it also exposes your company to security risks. Access this e-book to learn how to better monitor and secure your organization's digital footprint in 3 steps, even if you don't have an official brand presence in one.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Proofpoint, Inc.

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Read this white paper to discover a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

F5 Networks

6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Why CASB alone isn't enough
sponsored by Open Systems
WHITE PAPER: When it comes to cloud-based workplaces, firewalls and traditional security tools may no longer be enough. Open this white paper to learn how Cloud Access Security Broker (CASB) closes that gap. Plus, come to know how CASB provides 4 critical security functions to allow for deeper visibility and inspection of cloud services.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Open Systems
1 - 25 of 1282 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement