IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security Architecture White Papers (View All Report Types)
 
Buyer's Guide: User and Entity Behavioral Analytics
sponsored by Interset Software Inc.
WHITE PAPER: This white paper teaches you how to build useful RFI and RFPs, and prepares you for a behavioral-based security analytics purchase.
Posted: 12 Jan 2016 | Published: 09 Dec 2015

Interset Software Inc.

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Gartner Report: The Five Characteristics of an Intelligence-Driven Security Operations Center
sponsored by ThreatConnect
WHITE PAPER: Develop an intelligence-driven security operations center (SOC) approach by learning these 5 requirements and modify your security strategy from an exception-based process to a continuous one.
Posted: 13 Jan 2016 | Published: 02 Nov 2015

ThreatConnect

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Smarter Cybersecurity Solutions
sponsored by Webroot
WHITE PAPER: This white paper highlights a cloud-based, cybersecurity solution that enables you to provide your customers with one, simple solution. Learn how to provide your customers with security that will simplify deployment and management, as well as save time and money.
Posted: 31 Dec 2015 | Published: 31 Dec 2015

Webroot

Creating a Security Program That Exceeds Any Compliance Standard
sponsored by Tenable Network Security
WHITE PAPER: This resource describes the PCI DSS, the standard technical and operational requirements to protect cardholder data.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Puppet: The Good, Bad, and Ugly for Configuration Management & Security
sponsored by FoxT
WHITE PAPER: This white paper talks you through the strengths and vulnerabilities of running Puppet in your organization for IAM and steps to take to improve security. Read on to learn how to scale Puppet with your user base and keep employees secure.
Posted: 05 Jan 2016 | Published: 02 Dec 2015

FoxT

Prelert Analytics vs Holt-Winters Filtering
sponsored by Prelert
WHITE PAPER: In this technical brief, explore the comparison between two real time series data modeling and anomaly detection strategies. Learn how anomaly detection on real time series data requires specific modeling capabilities and review the results obtained with each approach.
Posted: 01 Feb 2016 | Published: 30 Dec 2015

Prelert

Prevent Cybercriminals from Taking Down your Business
sponsored by Microsoft
WHITE PAPER: This infographic reveals what companies are doing right (and wrong) in their security initiatives, and what it's costing them. Uncover technologies that not only build bigger walls against attacks, but also lock criminals out altogether.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Microsoft

Clinical Analytics Jumps in Importance
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: Access this expert e-guide to explore the impact of health data analytics on organizations today, and how your peers are leveraging analytics to improve clinical care quality and compliance.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Allscripts Healthcare Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement