IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
101 - 125 of 302 Matches Previous Page  |  Next Page
Protecting Your Data in a New Generation Virtual and Physical Environment
sponsored by Acronis
WHITE PAPER: Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment, eliminate single point of failure, and the need for multiple backup solutions.
Posted: 25 Jan 2016 | Published: 15 Oct 2014

Acronis

Complexity and Data Growth Driving Small and Medium-Sized Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Continue reading this white paper to learn how different businesses are utilizing a variety of strategies to manage their cloud, virtual and physical servers. Discover how to manage your hybrid IT environment efficiently.
Posted: 25 Jan 2016 | Published: 18 Jun 2014

Acronis

Is Your Team Prepared for a Data Breach?
sponsored by AllClear ID
WHITE PAPER: In this white paper, you will learn how to properly prepare for and respond to any data breaches your enterprise might experience.
Posted: 22 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Making Sense of the Shared Responsibility Model
sponsored by Palerra Inc.
WHITE PAPER: In this white paper, take a closer look at the Shared Responsibility Model and the misconceptions of the cloud service security infrastructure.
Posted: 21 Jan 2016 | Published: 16 Dec 2015

Palerra Inc.

Evaluating Cloud Security Solutions for Office 365
sponsored by Palerra Inc.
WHITE PAPER: Choosing the right Office 365 cloud security approach to defend your data is no simple task. This buyers guide gives you all of the key criteria and must-have features to look for when choosing a strategy.
Posted: 20 Jan 2016 | Published: 30 Dec 2015

Palerra Inc.

The Trust Cost of a Data Breach & How to Prepare
sponsored by AllClear ID
WHITE PAPER: This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Staying ahead of threats with global threat intelligence and automated protection
sponsored by IBM
WHITE PAPER: In this white paper you will discover how to stay ahead of the ever evolving security landscape and keep your precious data safe.
Posted: 19 Jan 2016 | Published: 30 Jun 2015

IBM

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

How Enterprises Are Attacking the IT Security Challenge
sponsored by CloudPassage
WHITE PAPER: This white paper will demonstrate the increasing complexity of managing IT security, spending trends, challenges and vulnerabilities.
Posted: 13 Jan 2016 | Published: 04 Sep 2015

CloudPassage

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Extortion by DDoS Attacks
sponsored by IBM
WHITE PAPER: This white paper explores why DDoS attacks are a hacker's favorite, the types of DDoS attacks commonly used, how to recognize a DDoS extortion attack, and whether or not you should pay the ransom. Read on now to learn how to protect your enterprise with proven recommendations and mitigation techniques.
Posted: 18 Dec 2015 | Published: 09 Dec 2015

IBM

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

Applying the "Diamond Model" of Threat Intelligence
sponsored by ThreatConnect
WHITE PAPER: This white paper takes a fun and humorous approach to breaking down how successful hacks occur and how they can be prevented.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

ThreatConnect

A Strategic Approach to Combatting Security Threats Featuring ESG Analyst Jon Oltsik
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This paper discusses how organizations can take a more strategic approach to threat management by moving to a tightly integrated and centrally managed defense-in-depth architecture.
Posted: 12 Nov 2015 | Published: 31 Oct 2015

Check Point Software Technologies Ltd.

Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Check Point Software Technologies Ltd.

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

Understand The Anatomy of Attacks to Stay One Step Ahead
sponsored by OpenDNS
WHITE PAPER: In this white paper, learn the 7 (often repetitive) steps of a cybersecurity attack. View now to learn how to leverage DNS to gain east-west visibility into your network and stop hidden attacks before your data is compromised.
Posted: 08 Oct 2015 | Published: 02 Sep 2015

OpenDNS

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015

IBM

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by WhiteHat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 01 Oct 2015 | Published: 18 Dec 2014

WhiteHat Security

A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation. Read on and learn what steps to take to achieve proactive IR.
Posted: 08 Jan 2016 | Published: 19 Aug 2015

Blue Coat Systems

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Privacy and Safety: How SSL Certificates Empower Your Business
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this infographic, learn the 6 golden rules for selecting an SSL or TLS certificate as well as tips and best practices for simple implementation and management. Discover how to put your users' minds to rest with the right SSL.
Posted: 11 Nov 2015 | Published: 07 Oct 2015

Symantec Website Security Solutions

New Buyers of SSL Certificates FAQs
sponsored by Symantec Website Security Solutions
WHITE PAPER: Industry analyst Chris Kissel presents and answers the top FAQs asked by new SSL certificate buyers to ease the purchasing process.
Posted: 09 Nov 2015 | Published: 14 Oct 2015

Symantec Website Security Solutions
101 - 125 of 302 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement