IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Reports
26 - 50 of 997 Matches Previous Page  |  Next Page
Unlock Business Opportunity without Taking Security Risks
sponsored by Juniper Networks
WHITE PAPER: This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics
sponsored by Hewlett Packard Enterprise
EBOOK: Utilize this 40-page CISO's guide to machine learning to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empowers analysts with new threat hunting capabilities.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Hewlett Packard Enterprise

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Protect High-Value Assets From Internal Security Risks
sponsored by Hewlett Packard Enterprise
RESOURCE: Access this resource to discover how your organization can gain back network security confidence regarding high-value assets and corporate data with user and entity behavior analytics.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Hewlett Packard Enterprise

UEBA Use Case: Insider Attack Identification
sponsored by Hewlett Packard Enterprise
RESOURCE: Allow this resource to teach you how network monitoring through behavioral analytics or user and entity behavior analytics (UEBA) can help detect and prevent advanced attacks.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Hewlett Packard Enterprise

Compromised User and Host Detection Using Behavioral Analytics
sponsored by Hewlett Packard Enterprise
RESOURCE: Allow this resource to teach you how network monitoring through multi-dimensional analytics enables the creation of high-fidelity entity risk profiles and shrinks the time to detect attacks.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Hewlett Packard Enterprise

Case Study: Growing Regional Bank Preempts Potential Cyber Attackers
sponsored by Illusive Networks
CASE STUDY: How do you get out in front of growing cyber risk without falling behind on your customer experience needs? This case study details Illusive Network's Deception Management System, a response tool which can help improve your organization's ability to identify and investigate a potentially malicious activity.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Illusive Networks

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Cloud Service Provider Reduces Impact of Global Denial-of-Service Attacks by Over 90 Percent
sponsored by Juniper Networks
CASE STUDY: In this case study learn how i3D.net, a managed hosting provider based in the Netherlands, reduced the impact of global DoS attacks by over 90% and reduced the amount of trouble tickets lowering service costs.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

Case Study: Ensure Growth with High-Performance, Intelligent Network Security
sponsored by Juniper Networks
CASE STUDY: This case study discusses how Hyland, a developer of enterprise software solutions, built a secure network that not only simplified and automated their security policy but improved network performance and reliability.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Juniper Networks

Monitoring Industrial Control Systems to Improve Operations and Security
sponsored by SecurityMatters
WHITE PAPER: Industrial Control Systems (ICS) sit at the core of every industrial process. This white paper details the pros and cons of several existing technologies that can be employed to monitor and protect ICS networks allowing organizations to best understand their environment and threat exposure throughout the entire security lifecycle.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

SecurityMatters

Wire Transfer Guard: Harnessing Distribution Deception to Prevent Cyber Fraud
sponsored by Illusive Networks
CASE STUDY: This resource highlights how early network visibility and insight allows defenders to secure the time they need to analyze the adversary and take appropriate action when protecting financial transfers.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Illusive Networks

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics

Cyber Security Framework Checklist
sponsored by Lynx Technology Partners
RESOURCE: This resource will walk you through creating your own IT risk program that follows the key elements of the NIST Cyber Security Framework. As an added bonus, uncover 3 reminders for establishing security best practices.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Lynx Technology Partners

Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015

Axiomatics

Stop the Cybersecurity Guessing Game
sponsored by NSS Labs
WHITE PAPER: According to Gartner, security spending keeps growing and it will increase by 26% in the next 3 years. However, many organizations are unclear of how secure they really are. Access this white paper to uncover how to address the unmitigated risks created by today's threats.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

NSS Labs

Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Modern IAM: Build Trust Without Sacrificing Security
sponsored by CA Technologies
WHITE PAPER: This white paper outlines how a modern identity and access management system can help build trust between yourself and your users without infringing on their freedom.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

CA Technologies

Unified Threat Management (UTM) Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Fortinet, Inc.

CW Benelux February 2018
sponsored by ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

ComputerWeekly.com

Sharing Threat Intelligence to Curb Targeted Attacks
sponsored by ServiceNow
RESOURCE: In this resource, learn how a Trusted Security Circle allows security teams to anonymously share observable data with industry peers, members of their supply chain or a global circle.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

ServiceNow

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

Computer Weekly – 30 January 2018: Davos debates global tech risks
sponsored by ComputerWeekly.com
EBOOK: In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
Posted: 26 Jan 2018 | Published: 25 Jan 2018

ComputerWeekly.com

5 Overlooked Windows 10 Security Risks
sponsored by VMware
EGUIDE: Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware
26 - 50 of 997 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement