IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
1 - 25 of 238 Matches Previous Page  |  Next Page
Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.
Posted: 16 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by White Hat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 16 Apr 2015 | Published: 18 Dec 2014

White Hat Security

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: In this research report, discover just how complicated SSL/TLS decryption and inspection methodologies have become and learn why you should make encrypted traffic management a near-term priority to address sophisticated SSL cyber threats.
Posted: 15 Apr 2015 | Published: 27 Feb 2015

Blue Coat Systems

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores an endpoint focused security strategy to allow protection to travel with the data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

A Much Needed Cybersecurity Paradigm Shift
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand in the battle for data and why organizations need to ramp up security measures, regardless of their current status. View now to gain insight into today's threat landscape.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Eliminating Virtual Network Security Blindspots
sponsored by Gigamon
WHITE PAPER: This white paper examines a holistic security approach using NPM, DLP, and SSL decryption to mitigate malware threats on virtualized networks. View now to learn more.
Posted: 13 Apr 2015 | Published: 29 Oct 2014

Gigamon

5 Steps to SSL Decryption
sponsored by Gigamon
WHITE PAPER: This white paper explores an alternative, five step SSL decrpytion strategy.  View now to learn more
Posted: 13 Apr 2015 | Published: 15 Oct 2014

Gigamon

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

7 ways bots hurt your website
sponsored by Distil Networks
WHITE PAPER: This webcast examines the seven ways that bots can destroy your website and how you can defend yourself against ruin.
Posted: 10 Apr 2015 | Published: 21 Jan 2015

Distil Networks

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

How to Secure Programming Language Platforms Across Your Enterprise
sponsored by Browsium
WHITE PAPER: Access this white paper to find answers to competing compatability and security objectives. Discover solutions that will enable you to keep running older, known-compatible programming language tools in a secure and isolated environment.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Browsium

How the Financial Industry can Prepare for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: The financial services industry needs to evolve to meet the cybercrime of today. In this white paper, learn more about what these crimes look like and how to stop them.
Posted: 10 Apr 2015 | Published: 31 Mar 2014

Hewlett-Packard Limited

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

The Rise of Web Bot Attacks and Demise of Traditional Defenses
sponsored by Distil Networks
WHITE PAPER: This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.
Posted: 07 Apr 2015 | Published: 18 Feb 2015

Distil Networks

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security Empowers Business
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a way of creating security systems that are a proactive business asset, not a reactive way to slow the business down.
Posted: 07 Apr 2015 | Published: 31 May 2013

Blue Coat Systems

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

How to Choose A Certificate Authority for Safer Web Security
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper sheds light on the seven measures a trustworthy CA needs to take and how to choose a reliable CA.
Posted: 07 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

4 Steps to Simplifying SSL Management
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper outlines the three challenges of SSL certificates and why the ad hoc security approach fails. View now to explore a new approach to simplifying SSL certificate management and reducing complexity in four steps.
Posted: 07 Apr 2015 | Published: 16 Oct 2013

GeoTrust, Inc.

TOP 5 CRITICAL CAPABILITIES FOR YOUR MALWARE SANDBOXING STRATEGY
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover the top five criteria of effective malware sandboxing.
Posted: 06 Apr 2015 | Published: 31 Mar 2014

Blue Coat Systems

Security Vs. Innovation: Do CIOs have to choose?
sponsored by Red Hat
WHITE PAPER: This article shows how you can balance your need for business innovation and security by introducing a secure datacenter that allows for secure BYOD, cloud computing and more.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Red Hat

Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

FireEye
1 - 25 of 238 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement