IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security Architecture White Papers (View All Report Types)
 
Report: The Impact of Security Threats on Business
sponsored by Radware
WHITE PAPER: In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

A Unified View for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

KuppingerCole Report: Access Management and Federation
sponsored by IBM
WHITE PAPER: Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.
Posted: 26 Aug 2016 | Published: 31 Mar 2016

IBM

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
WHITE PAPER: Learn what IT pros are saying about Microsoft Azure and how it handles identity and access management, network security, data protection, and more. Discover how to gain insight on how your existing environment maps to potential public cloud offerings.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: It's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

The Case for Security Intelligence Services, Hosted from the Cloud
sponsored by IBM
WHITE PAPER: Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.
Posted: 30 Aug 2016 | Published: 01 Apr 2015

IBM

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper and discover how you can securely scale protection to your cloud infrastructure and workloads, and segment both within the cloud and between endpoints, enterprise networks, and the cloud to keep your data safe.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement