Security Infrastructure White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Design and Development  >  

Security Infrastructure

MORE SPECIFIC TOPICS:  Public Key Infrastructure
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 698 Matches
Strengthening and Simplifying Enterprise Security and Data Protection
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.
Get This Now
CDW Corporation

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
eGuide: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach detection issues.
Get This Now
IBM

Innovative Technology for Enterprise Security and Enablement
sponsored by CDW Corporation
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:Read now to learn more about this company's advanced security solutions, which work in conjunction with one another to leverage your enterprise's security, efficiency, compliance, and enablement.
Get This Now
CDW Corporation

Webcast: Protecting Enterprise Networks and Endpoints - Vendor Webcast
sponsored by CDW Corporation
Webcast: | Posted: 21 Jul 2014
Premiered:May 31, 2014
Summary:This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Get This Now
CDW Corporation

Accessing Your Cloud Risk - Expert Webcast
sponsored by Sophos, Inc.
Webcast: | Posted: 18 Jul 2014
Premiered:Jul 10, 2014
Summary:This webcast explains the best ways to assess your cloud risk and if it is a good fit for your organization.
Get This Now
Sophos, Inc.

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy - Vendor Webcast
sponsored by AlienVault
Webcast: | Posted: 18 Jul 2014
Premiered:Jul 18, 2014
Summary:This webcast provides insight into rethinking vulnerability management. It also reviews the common challenges of vulnerability management and ways to overcome those challenges.
Get This Now
AlienVault

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Get This Now
CDW Corporation

Security in a Faster Forward World: Respond to a Constantly Changing Threat Landscape
sponsored by Akamai Technologies
White Paper: | Posted: 18 Jul 2014
Published:30 Sep 2013
Summary:This white paper explains some of the challenges in the current, evolving threat landscape. It also highlights the benefits of a website protection service with on-demand scale.
Get This Now
Akamai Technologies

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and Intel®
White Paper: | Posted: 18 Jul 2014
Published:07 Feb 2014
Summary:Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Get This Now
Dell, Inc. and Intel®

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
White Paper: | Posted: 16 Jul 2014
Published:01 Feb 2013
Summary:Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Get This Now
Thales

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
Resource: | Posted: 16 Jul 2014
Published:16 Jul 2014
Summary:View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Get This Now
CDW Corporation

Cloud-Based Security Software Opens Floodgates for IT Innovation
sponsored by GFI Cloud
eGuide: | Posted: 15 Jul 2014
Published:15 Jul 2014
Summary:In this expert e-guide, learn how one IT specialist was able to turn a modest investment in cloud-based security into a secured environment.
Get This Now
GFI Cloud

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
White Paper: | Posted: 14 Jul 2014
Published:14 Jul 2014
Summary:This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Get This Now
Neustar®

Imperva Security Solutions
sponsored by Imperva
White Paper: | Posted: 11 Jul 2014
Published:11 Jul 2014
Summary:This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Get This Now
Imperva

How Web Application and Next Generation Firewalls Stack Up Against OWASP Threats
sponsored by Imperva
Resource: | Posted: 11 Jul 2014
Published:31 Dec 2013
Summary:This infographic depicts how two types of firewalls--web application firewalls and next generation firewalls--measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP) threats.
Get This Now
Imperva

1 - 15 of 698 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com