IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesWhite Papers (View All Report Types)
101 - 125 of 187 Matches Previous Page  | Next Page
Essentials of Secure Network Access for Remote Workers
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you will discover two options that can maintain a company's network security while also meeting the ever-changing needs of today's constantly mobile workforce and consumer base.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Global Knowledge

Securely Accelerate Your Mobile Business
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper discusses how you can take an application- and data-centric approach to mobile security so you can balance business enablement with protection, all the while maintaining user privacy.
Posted: 11 Dec 2013 | Published: 11 Dec 2013

CA Technologies.

Essential enterprise mobile device security controls
sponsored by SearchSecurity.com
WHITE PAPER: This expert paper discusses the key challenges for improving your mobile security and what tools you can leverage in order to overcome them. Access this resource now and find out which security control solutions are critical to secure your mobile environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers
sponsored by Trend Micro
WHITE PAPER: In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Trend Micro

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Flexibly Align Data Protection to different SLAs
sponsored by Fujitsu
WHITE PAPER: This exclusive white paper discusses a data backup tool that can flexibly align data protection to different service level agreements (SLAs) to enhance your data protection environment and ensure speedy recovery when disaster inevitably strikes.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Fujitsu

A Practical Disaster Recovery Protection Tool
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Fujitsu

Secure iPhone Access to Corporate Web Applications
sponsored by F5 Networks
WHITE PAPER: This exclusive resource discusses how your organization can secure one of the top mobile devices on the market, ensuring that its access to corporate web applications is safe.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

F5 Networks

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

Who Controls Your Information in the Cloud?
sponsored by Proofpoint, Inc.
WHITE PAPER: This informative white paper discusses these crucial questions, and examines what your organization can do to address cloud data privacy and ensure that your critical data stays in the right hands.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

Proofpoint, Inc.

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Computer Weekly special report: Mobile device management and the importance of absolute compliance
sponsored by BlackBerry
WHITE PAPER: Ensuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

BlackBerry

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.

Getting a better grip on mobile devices
sponsored by IBM
WHITE PAPER: This exclusive resource examines how your organization can best adapt to the expanding role of smartphones and tables within the enterprise.  Discover best in class strategies for empowering employees' efficiency and productivity, while also maintaining a positive security posture.
Posted: 13 Aug 2013 | Published: 13 Aug 2013

IBM

Cloud security concerns you must address
sponsored by HP & Intel®
WHITE PAPER: This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data.
Posted: 01 Aug 2013 | Published: 26 Jul 2013

HP & Intel®

Third Annual Juniper Networks Mobile Threats Report
sponsored by IBM and Juniper
WHITE PAPER: This exclusive paper discusses the major trends that have been gaining momentum in the field of mobile threats, outlining what kinds of attacks are increasing, who is being affected and how these trends could impact future mobile technology development.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

IBM and Juniper

Transitioning to the Private Cloud with Confidence
sponsored by Cisco
WHITE PAPER: Cloud computing may be the future of IT, but it also presents challenges businesses can't afford to overlook. Review the key characteristics, business benefits and barriers when moving to a private cloud.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

Cisco

Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
sponsored by IBM
WHITE PAPER: IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

IBM

How to Make Your Business More Flexible & Cost Effective?
sponsored by Panda Security
WHITE PAPER: Access this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Panda Security

Panda Cloud Systems Management: Monitor Datasheet
sponsored by Panda Security
WHITE PAPER: This informative paper discusses a cloud-based IT management solution that anticipates problems proactively, monitoring device activity through mediums such as alerts, dashboards and tickets so you can deal with incidents before they cause problems.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security

Dell DVS Enterprise - Mobile Secure Desktop
sponsored by Dell and VMware
WHITE PAPER: This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Dell and VMware

Cloud security, options and trends
sponsored by CenterBeam
WHITE PAPER: In this brief Q&A, Shahin Pirooz, Chief Technology and Security Officer and Executive Vice president of cloud solutions at CenterBeam, Inc. provides expert analysis of the current state of cloud security. Read now for valuable advice on how you can tailor your cloud infrastructure to meet the needs of your business.
Posted: 28 May 2013 | Published: 28 May 2013

CenterBeam

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.
101 - 125 of 187 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement