IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
1 - 25 of 381 Matches Previous Page  |  Next Page
Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Inside, learn about one offering that combines network, cloud and endpoint security capabilities, and enables them all with accurate threat intelligence to prevent successful cyber breaches. Read on to find 6 key abilities of this offering that make it stand out
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years, as several best practices already in place in financial service protection strategies that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Monitoring Serverless Architectures in AWS
sponsored by AWS-Cisco
WHITE PAPER: The introduction of serverless architectures is helping reduce exposure to threats by breaking services into single-purpose functions with well-defined inputs and outputs. This white paper discusses methods of auditing and monitoring of Amazon Web Services Lambda functions and how to put these methods into practice.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

AWS-Cisco

3 Reasons Manufacturers Need to Upgrade to Cloud Faxing
sponsored by J2 Cloud Services
WHITE PAPER: Read this white paper to discover how your company can upgrade to a cloud faxing platform to give your manufacturing operation a competitive advantage.
Posted: 11 Sep 2017 | Published: 24 Jul 2017

J2 Cloud Services

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: Find out how attackers launch different types of DDoS so that you can prepare your organization's security strategy to protect the key apps and data on its network.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

A10 Networks

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell and Microsoft

Malware Review Q1 2017
sponsored by PhishMe
WHITE PAPER: Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Advantage of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper seeks to outline in easy-to-understand language, the real difference between security fabrics and security platforms, each of which claims to be the next-generation in security architecture.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Fortinet, Inc.

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Your Guide to Combating Phishing in 2017
sponsored by PhishMe
WHITE PAPER: To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.
Posted: 13 Jun 2017 | Published: 12 Jun 2017

PhishMe

Dealing with Ransomware, Business Email Compromise and Spearphishing
sponsored by PhishMe
WHITE PAPER: Phishing, spearphishing, CEO Fraud/BEC and ransomware represent serious threats to any organization. Access this survey report to discover 14 robust cybersecurity best practices that can be implemented to reduce the chances of these threats.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

PhishMe

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

Cloud Computing Top Threats
sponsored by HPE and Intel® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and Intel® Corporate

Evolving the Mobile Security Architecture Toward 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper prepares your mobile security for 5G by examining the mobile threat landscape, software programmability and cellular standards.
Posted: 07 Jun 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.
1 - 25 of 381 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement