security infrastructure

Results 326 - 350 of 368Sort Results By: Published Date | Title | Company Name
Published By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : 
insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management, access control, it security, netiq, net iq, security, governance, infrastructure, network architecture, network management
    
NetIQ Corporation
Published By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : 
risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability, intrusion detection, ids, risk, riskwatch, network security, auditing, business continuity, compliance, internet security, software compliance
    
RiskWatch
Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access, web service security, internet security, landesk
    
LANDesk
Published By: Blue Lane     Published Date: Jan 07, 2008
Quantros’ business—an ASP for the health care industry—requires a secure network and maximal uptime—all with a small IT department and a small budget. Quantros was challenged to implement and enforce sound security policies and to keep up with the continuous stream of vendor patches.
Tags : 
high availability, server, virtual server, network security, server vulnerability, vulnerability, vulnerabilities, quantros, vmware, infrastructure, blue lane, bluelane, servers
    
Blue Lane
Published By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : 
gfi, smbs, small, medium, business, it infrastructure, security, windows nt, exchange server, aup, acceptable use policy, remote access policy, secure, internet policy, it management, infrastructure, access control, internet security
    
GFI
Published By: Ecora Software     Published Date: Aug 15, 2007
Better preparation means better results – Learn how to prepare for an audit; how to develop a self-audit process; how to develop a security template; and much more.
Tags : 
security audit, audit, auditing, vulnerability assessment, vulnerability management, infrastructure, patch, patch management, compliance, holes, security holes, ecora
    
Ecora Software
Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects, local area networking, identity management, policy based management, security management
    
Nevis Networks
Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis, nevis networks, precision prospects
    
Nevis Networks
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, infrastructure, networking, spend management
    
KEMP Technologies
Published By: Oracle Corp.     Published Date: Sep 05, 2012
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract.
Tags : 
oracle, exalogic, security, infrastructure, storage, compliance
    
Oracle Corp.
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security, infrastructure, enterprise software, server virtualization, windows, desktop management
    
Red Hat
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage
Published By: Equinix     Published Date: Jul 31, 2012
Learn how the company reduced costs, achieved LAN-speed latency with AWS, increased application performance, and improved customer experience. The added ability to expand to locations not served by public cloud provided added strategic advantage.
Tags : 
equinix, security, colo, lan, speed, latency, badgeville, public, cloud, application, performance, infrastructure, fiber, optic, isp, networking, wireless, blade servers, network attached storage, storage area networks
    
Equinix
Published By: CDW Vmware     Published Date: Aug 02, 2012
There's a reason why the buzz around cloud computing never seems to die down. Concrete results are replacing the initial hype. Many organizations are taking advantage of private clouds which come with the accessibility of a public cloud and the security of a local server.
Tags : 
data, center, private, cloud, benefits, computing, security, local, server, protection, comliance, cisco, application, virtualize, standardize, hardware, internal, network, infrastructure, local area networking
    
CDW Vmware
Published By: Splunk     Published Date: Oct 15, 2012
Supporting a Big-data Approach for Security Intelligence
Tags : 
splunk, security, malware protection, security, it infrastructure, security intelligence, data center
    
Splunk
Published By: Logicalis     Published Date: Aug 20, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage, and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking, security, software development, it management, knowledge management, data management, virtualization, converged infrastructure, draas, cloud computing, automation, automation & orchestration, protection
    
Logicalis
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking, security, data management, servers, operating system, infrastructure, ibm puresystems, storage
    
IBM
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: NetApp     Published Date: May 29, 2018
Read the IDC research report Shared Storage Offers Lower TCO than Direct-Attached Storage for Hadoop and NoSQL Deployments and learn how to: Unify insights across various data sources and multiple cloud deployments Reduce compute, capacity and operational costs Increase security and prevent data loss Plus, learn about the NetApp in-place analytics solution for your existing NAS data and how it can reduce infrastructure costs
Tags : 
    
NetApp
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: MobileIron     Published Date: Mar 21, 2017
In 2017, BlackBerry customers will face a major IT challenge — rebuilding their entire mobile security infrastructure when BlackBerry officially end-of-lifes its Good for Enterprise email app. Migrating to BlackBerry’s offering involves more than just rolling out a new app; it will require IT to spend significant time and resources to redefine policies, retrain IT and help desk staff, and re-enroll hundreds or even thousands of users in the new software.
Tags : 
    
MobileIron
Published By: Dell EMC     Published Date: Feb 23, 2017
This study provides IT decision-makers with insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches.  Based on interviews with organizations that implemented VCE solutions, Forrester Consulting quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure, security, and compliance. The study describes a process for setting improvement goals and measuring success for infrastructure modernization. This process is supported by an intuitive template.
Tags : 
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.