IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
1 - 25 of 307 Matches Previous Page  |  Next Page
Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 10 Feb 2016 | Published: 15 Dec 2015

Imperva

Encryption: Quickly Deploy Security Solutions
sponsored by Oracle Corporation
WHITE PAPER: Access this data sheet and learn ways to quickly deploy encryption and other security solutions by centrally managing encryption keys.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Oracle Corporation

Complete Website Security and the Fight Against Organized Cybercrime
sponsored by Symantec Website Security
WHITE PAPER: This white paper explores the numerous types of attacks aiming to take your website down and/or cause a data breach and why organizations can't keep up with this onslaught alone. Read on to find out if comprehensive security could be the answer to blocking malicious threats.
Posted: 10 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Securing Your Network and Application Infrastructure: 24 Experts Share Their Secrets
sponsored by Fortinet, Inc.
WHITE PAPER: This collection of 24 essays, written by experts, covers five major security topics that are more relevant than ever, including: protecting the core of your network, staying ahead of hackers, and 3 more.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Forrester Endpoint Thought Leadership Paper
sponsored by Palo Alto Networks
WHITE PAPER: This white papers shows solutions that deliver strong integration between network and endpoint security.
Posted: 10 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

4 Step Get Started Guide to Open Source Security Triage
sponsored by Black Duck Software
WHITE PAPER: This white paper helps you ask the right questions about your open source security vulnerabilities and find answers to them.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Why Enterprises Need a Comprehensive Solution for Website Security
sponsored by Symantec Website Security
WHITE PAPER: This white paper describes the cybersecurity challenges organizations are up against and how a comprehensive security strategy is the key to mitigating data breaches.
Posted: 09 Feb 2016 | Published: 03 Feb 2016

Symantec Website Security

Comprehensive SSL Certificate Management
sponsored by Symantec Website Security
WHITE PAPER: By following six simple steps and the right methodology, proper SSL certificate management is achievable. In this white paper, discover the benefits of proper SSL certificate management.
Posted: 09 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

Shifting Threat Environment Undercuts Defenses
sponsored by Symantec Website Security
WHITE PAPER: In this white paper, learn how to patch vulnerabilities and detect hidden advanced threats on your network and website.
Posted: 08 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Your Next Digital Security Guard Should be More like RoboCop
sponsored by Prelert
WHITE PAPER: In this white paper, discover how to use machine intelligence to patch major network security vulnerability gaps and mitigate human errors. Continue reading to learn how to identify abnormal and potentially malicious activity as it occurs.
Posted: 05 Feb 2016 | Published: 24 Jun 2015

Prelert

Cisco Advanced Malware Protection Leads Again in NSS Test
sponsored by Cisco
WHITE PAPER: In this white paper, you will learn how to reduce both detection time and remediation time. Go beyond point-in-time detection with your security solutions.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper explores micro-segmentation, a new and popular network security approach, and how to stop hackers from moving laterally within the data center.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

The Evolution of Vendor Risk and Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper talks about the Financial Service industry's pioneering in developing risk management practices.
Posted: 04 Feb 2016 | Published: 31 Jan 2016

BitSight

Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centers and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

2016 Annual Security Report
sponsored by Cisco
WHITE PAPER: This security report presents research, insights and perspectives highlighting the challenges that defenders face in blocking attackers.
Posted: 04 Feb 2016 | Published: 01 Feb 2016

Cisco

Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: This white paper discusses attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

BitSight

See, Understand, and Swiftly Respond to Advance Threats
sponsored by Blue Coat Systems
WHITE PAPER: This white paper stresses the imprtance of network visibility and how real-time analysis enables you to see, understand, and respond to emerging and incoming security threats.
Posted: 03 Feb 2016 | Published: 16 Apr 2014

Blue Coat Systems

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert
1 - 25 of 307 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement