IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security Architecture White Papers (View All Report Types)
 
Enhance Data Protection with Analytics and Insights
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to maintain an agile data protection strategy that allows you to adapt to fast-changing markets, organizational demands, and the new demands of acquisitions.
Posted: 05 May 2017 | Published: 05 May 2017

Hewlett Packard Enterprise

Your Endpoint Essentials Checklist
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover a comprehensive checklist to ensure that your endpoints have essential features to protect your enterprise from ransomware and other malicious activities.
Posted: 16 May 2017 | Published: 16 May 2017

Symantec & Blue Coat Systems

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany
Posted: 10 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 02 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

6 Vendor Risk Assessment Resource Drains to Avoid
sponsored by Rsam
WHITE PAPER: Discover 6 ways your organization may be allocating resources unnecessarily in remediating vendor risk.
Posted: 04 May 2017 | Published: 04 May 2017

Rsam

Mitigate Insider Threats: User Activity & Behavior Monitoring Program
sponsored by Veriato, Inc.
WHITE PAPER: Learn how to best implement a user activity monitoring and/or user behavior analytics program to increase security against insider threats, drive productivity increases, and produce more efficient and effective employee investigations.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Five Tips For Your GRC Risk Scoring System
sponsored by Rsam
WHITE PAPER: Discover 5 tips to improve your enterprise's governance, risk and compliance scoring system so that you can standardize reporting, streamline workflows, communicate risk clearly to stakeholders and more.
Posted: 03 May 2017 | Published: 03 May 2017

Rsam
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement