IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security ArchitectureWhite Papers (View All Report Types)
 
LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Mobile Data Security: Protecting your critical information
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This exclusive paper discusses a mobile access solution that provides secure, reliable, and efficient access to critical data and applications from any mobile device.
Posted: 30 May 2014 | Published: 30 May 2014

Raytheon Trusted Computer Solutions

Why You Must Have Cloud Governance Before You Move Your Apps
sponsored by CA Technologies.
WHITE PAPER: Access this resource to explore how you can leverage traditional SOA governance programs and extend practices to your future cloud deployment.
Posted: 04 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Onapsis Security Platform Datasheet
sponsored by Onapsis
WHITE PAPER: Organizations today have little to no visibility into the actions being performed on or against their SAP systems either historically or in real time. The following white paper explores this issue and offers insight into a detection and response solution that can help detect abnormalities within SAP and finally provide peace of mind from attacks.
Posted: 28 Oct 2014 | Published: 28 Oct 2014


Guarding the Castle
sponsored by Dell Software
WHITE PAPER: This ebook details the sophisticated strategies and tools that today's cybercriminals use to infiltrate your network, and how you can stop them.
Posted: 08 May 2014 | Published: 08 May 2014

Dell Software

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement