Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security infrastructure

Results 351 - 375 of 428Sort Results By: Published Date | Title | Company Name
Published By: VeriSign Incorp.     Published Date: Oct 15, 2008
Learn about the current trends in Internet fraud, and how VeriSign Inc. is helping organizations protect critical data and instill trust for their customers.
Tags : 
security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : 
mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca)
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.
Published By: Splunk Inc.     Published Date: Jun 02, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!
Tags : 
operations, it search, data center, splunk, business intelligence, compliance, security, it infrastructure
    
Splunk Inc.
Published By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : 
sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security
    
Cisco
Published By: SilverSky     Published Date: May 09, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.
Tags : 
silversky, economic impact, network security, security solutions, forrester research, security threats, risk-adjusted, productivity
    
SilverSky
Published By: SilverSky     Published Date: Aug 27, 2014
Learn how your company can increase their security by adopting this holistic approach.
Tags : 
silversky, security, targeted attacks, retail security, security infrastructure, detection, zoning, network security
    
SilverSky
Published By: Dell Software     Published Date: Aug 30, 2013
In this new technical brief, discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with troubleshooting virtualization challenges. Read this technical brief today.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology, it management
    
Dell Software
Published By: IBM     Published Date: Jan 02, 2014
This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, analytics, global business service, big data, business value, it professionals, volume, velocity
    
IBM
Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how to seize new business opportunities by embedding security into the intelligent network infrastructure and across the extended network.
Tags : 
cisco, cisco security, digital economy, network infrastructures, network security, internet of everything, ioe, networking
    
Cisco
Published By: CenturyLink Technology Solutions     Published Date: Sep 02, 2014
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your infrastructure into a more efficient virtual environment.
Tags : 
centurylink, data center, colocation, infrastructure, facility management, data center design and management, colocation and web hosting
    
CenturyLink Technology Solutions
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to learn why security needs to be as pervasive as the IoE itself.
Tags : 
internet of everything, ioe, security, cloud, digital business models, network infrastructure, networking, it management
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: IBM     Published Date: Jan 09, 2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Tags : 
best practices, it security, cloud infrastructure services, it business solutions, enterprise applications, data center
    
IBM
Published By: Rapid7     Published Date: Oct 15, 2013
This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.
Tags : 
rapid7, risk, security, real-time, infrastructure
    
Rapid7
Published By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : 
ipad, apple, business solutions, seminar, apps, ipad apps, it security, security
    
Apple Corporation
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the six key cost considerations when evaluating cloud services and the best practices on selecting a suitable provider.
Tags : 
sungard, sungard availability services, cloud, cloud computing, cloud service, it operations, cost efficiency, flexibility
    
SunGard Availability Services
Published By: EarthLink Business     Published Date: May 15, 2014
This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).
Tags : 
earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
EarthLink Business
Published By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : 
riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
    
Riverbed
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
Cloud datacenter security is becoming imperative in the new age of malware attacks. To stay competitive and secure, organizations are turning to smart networking in an effort to close the datacenter security gap. The combination of VMware NSX, AirWatch Tunnel and Horizon View helps close this gap and simplifies security management for IT professionals. With the upcoming prevalence of authentication and identity management in an organization’s infrastructure, the need to delegate and define network access continues to highlight the important role of hybrid cloud security that addresses all end-user devices.
Tags : 
    
VMware
Published By: Viavi Solutions     Published Date: Apr 01, 2015
With the expanding sophistication of large-scale breaches, the question isn’t whether most organizations will be hacked – it’s when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.
Tags : 
apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection
    
Viavi Solutions
Published By: Unitek Education     Published Date: Jan 08, 2009
Unitek's CCNA boot camp is taught by a certified industry expert, who is adept at not just CCNA curriculum, but also teaches CCNP and CSP1 (Cisco high-end security track) tracks. The instructor is also a Unitek consultant, and spends a significant portion of his time providing high-end network infrastructure consulting services. A true industry expert!!
Tags : 
unitek, ccna, ccna boot camp, ccna curriculum, cisco high-end security track, network infrastructure, cisco ccna
    
Unitek Education
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.