IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
1 - 25 of 736 Matches Previous Page  |  Next Page
Securing the Cloud Generation
sponsored by Symantec
ASSESSMENT TOOL: To help organizations migrate to the cloud, Symantec developed an assessment tool which includes learnings they gained when preparing for their move to the AWS cloud. Download this assessment tool to discover a series of questions across 4 domains that can help you evaluate your readiness for the public cloud.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Work Less. Secure More
sponsored by Symantec
RESOURCE: Today, your InfoSec teams simply can't deal with the exploding number of threats in the cloud and keep pace with your continuous integration and development processes. But intelligent automation can. In this infographic, learn how Symantec Cloud Workload Protection makes sure you never have to sacrifice safety for speed.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

AWS Dynamic Duo Infographic
sponsored by Symantec
RESOURCE: DevOps and InfoSec need to integrate their processes and work collaboratively to secure organizations as their reliance on public cloud infrastructure grows. Download this infographic to discover a 5-step action plan for embracing DevSecOps in your organization.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Cloud Security: Are You Ready?
sponsored by Symantec
ANALYST REPORT: Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.
Posted: 21 Aug 2019 | Published: 30 Jun 2018

Symantec

Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

Fortinet Private Cloud Security Solutions: Use Cases for Comprehensive Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations that invest in hybrid cloud infrastructures often realize significant business value, however; private clouds bring their own unique security challenges. In this white paper, explore 5 key uses cases for private cloud security and discover the benefits of Fortinet's private cloud security solution.
Posted: 13 Aug 2019 | Published: 02 Apr 2019

Fortinet, Inc.

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Scaling SSL/TLS Visibility to 10G, 100G and Beyond
sponsored by Corsa Technology Inc
WHITE PAPER: In this white paper, learn how you can scale SSL/TLS visibility in an economical way to inspect all traffic passing through your network.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Corsa Technology Inc

CyberConverged Data Storage
sponsored by RackTop Systems
DATA SHEET: Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage Designed for the Creative Process
sponsored by RackTop Systems
DATA SHEET: Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Getting a Handle on Data Exposure
sponsored by RackTop Systems
DATA SHEET: The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Machine Learning in Security
sponsored by Micro Focus
WEBCAST: In this webcast, Mario Daigle, VP of Product for Interset, a Micro Focus company, discusses 2 main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

CW Nordics August 2019: Copenhagen woos tech startups
sponsored by ComputerWeekly.com
EZINE: Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.
Posted: 07 Aug 2019 | Published: 22 Aug 2019

ComputerWeekly.com

Insights into Building an Industrial Control System Security Operations Center
sponsored by Dragos
WHITE PAPER: One of the most dedicated focuses towards security that can be implemented in an ICS is a security operations center (SOC). In this white paper, learn how best practices from enterprise IT SOCs can be adapted to focus on ICS environments.
Posted: 05 Aug 2019 | Published: 31 Mar 2017

Dragos

Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
WEBCAST: Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER: As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Trend Micro, Inc.

Assessing Cloud Access Security Brokers
sponsored by Proofpoint
ANALYST REPORT: Cloud access security brokers are becoming a must have for enterprises as they commit to the cloud. Which CASB vendor is best for yours?
Posted: 30 Jul 2019 | Published: 29 Oct 2018

Proofpoint

CW ASEAN: Trend Watch – Security
sponsored by ComputerWeekly.com
EZINE: Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
Posted: 11 Jul 2019 | Published: 18 Jul 2019

ComputerWeekly.com

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs
sponsored by SkOUT
CASE STUDY: To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

SkOUT

How to Prevent Data Breaches
sponsored by SkOUT
WHITE PAPER: How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

SkOUT

What is Phishing?
sponsored by SkOUT
WHITE PAPER: Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

Cloud Visibility Report
sponsored by FairWarning
RESEARCH CONTENT: As businesses leverage cloud computing as a central point of business, they have begun looking for security-centric ways to monitor how users are interacting with cloud applications. In this Cloud Visibility Report, learn how other organizations are proactively monitoring their cloud application to gain critical insights into application usage.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

FairWarning
1 - 25 of 736 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement