IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
1 - 25 of 264 Matches Previous Page  |  Next Page
Industry Best DNS-Based DDoS Protections
sponsored by Nominum, Inc.
WHITE PAPER: In this white paper, you'll learn why better DNS defenses are needed to mitigate advanced and evolving bot-based malware and DDoS attacks.
Posted: 28 Aug 2015 | Published: 19 Aug 2015

Nominum, Inc.

Partnering Up to Meet Your Clients' Security Needs
sponsored by Webroot
WHITE PAPER: This white paper discusses the opportunity that today's cybersecurity challenges present to solution providers and explains why finding the right security partner is essential for capitalizing on it.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Webroot

Security in the Cloud: Tips on How to Protect Your Data
sponsored by Procore
WHITE PAPER: This white paper outlines the basics of cloud storage security and the capabilities to look for in providers to ensure data protection.
Posted: 27 Aug 2015 | Published: 05 Aug 2015

Procore

Security Essentials for CIO's: Establishing a Department of Yes
sponsored by IBM
WHITE PAPER: This white paper presents a five-step process for enterprise security that allows you to encourage business innovation without putting your business at risk.
Posted: 26 Aug 2015 | Published: 31 Mar 2012

IBM

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014

Webroot

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: This white paper outlines the 6-point anatomy of APTs and how they evade traditional cybersecurity architectures.
Posted: 24 Aug 2015 | Published: 29 Jul 2015

Gigamon

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: In this white paper, you'll discover how managed service providers and IT service providers can help their clients mitigate risk in this increasingly complex cyber threat landscape
Posted: 24 Aug 2015 | Published: 31 Dec 2014

LogicNow

Five Critical Questions You Should Be Asking SIEM Vendors
sponsored by Splunk
WHITE PAPER: This white paper examines one solution that provides agile threat response via a combination of pre-built data views and ad hoc analysis. Read on here to find out how to and cultivate the knowledge of your security practitioner by asking questions of potential vendors.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Splunk

Keys to Balancing Security and Convenience
sponsored by SafeNet, Inc.
WHITE PAPER: This paper examines why the need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

SafeNet, Inc.

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Technology for Simplified SOC Creating
sponsored by Splunk
WHITE PAPER: This white paper discusses the importance of an SOC and gives suggestions for implementing technology that simplifies the process of SOC creation.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

Forrester: Use Actionable Threat Intelligence to Protect Your Digital Business
sponsored by Symantec Corporation
WHITE PAPER: Download this report from Forrester to figure out the key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.
Posted: 14 Aug 2015 | Published: 14 Aug 2014

Symantec Corporation

Big Data SIEM on the Horizon
sponsored by Splunk
WHITE PAPER: In this white paper, you will learn the three SIEM trends that call for a big data SIEM approach as well as the limitations of traditional SIEM strategies.
Posted: 12 Aug 2015 | Published: 05 Aug 2015

Splunk

Data Breaches: What Can and Cannot Be Done
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the inevitability of data breaches and gives tips for staying as secure as possible in an insecure threat environment.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Global Knowledge

5 Tips to Get Your Site Hosting Started
sponsored by Hostway Corporation
WHITE PAPER: Are you considering website hosting? This white paper serves as an end-to-end guide in doing so. Click here to see why web hosting (and email) should be part of your market offering.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Hostway Corporation

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper describes ten steps you can take to increase your cybersecurity.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Absolute

Managed Security Services: How Can They Benefit You?
sponsored by IBM
WHITE PAPER: This white paper discusses the financial and technological benefits of investing in managed security services.
Posted: 06 Aug 2015 | Published: 31 Jan 2014

IBM

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Build Security that's Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses the importance of proactive security and how you can build that kind of security in your environment.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

Security Services for Defeating Sophisticated Attacks
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses what you can achieve with the right people looking out for your security.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

Why IT Professionals Need to Take Responsibility for Data Security
sponsored by Oracle Corporation
WHITE PAPER: This white paper presents the results of a survey that asked IT professionals about their data security practices, revealing the areas where most organizations need to improve.
Posted: 04 Aug 2015 | Published: 31 Oct 2014

Oracle Corporation

A Strategic Partner for Proactive Security
sponsored by CrowdStrike
WHITE PAPER: This brochure explains how choosing the right security partner can help you thrive in today's dangerous cybercrime environment.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Establishing a Mobile Security Architecture
sponsored by Oracle Corporation
WHITE PAPER: This resource can help you build a new security architecture that embraces mobility.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Oracle Corporation
1 - 25 of 264 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement