IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesWhite Papers (View All Report Types)
101 - 125 of 180 Matches Previous Page  | Next Page
Defeating Advanced Persistent Threat Malware
sponsored by Infoblox
WHITE PAPER: How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.
Posted: 10 Sep 2013 | Published: 31 Jan 2013

Infoblox

How to Build a Massively Scalable Next-Generation Firewall
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell Software

Getting a better grip on mobile devices
sponsored by IBM
WHITE PAPER: This exclusive resource examines how your organization can best adapt to the expanding role of smartphones and tables within the enterprise.  Discover best in class strategies for empowering employees' efficiency and productivity, while also maintaining a positive security posture.
Posted: 13 Aug 2013 | Published: 13 Aug 2013

IBM

Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
sponsored by IBM
WHITE PAPER: IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

IBM

Top 10 Reasons You Don't Need MDM
sponsored by Fiberlink
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 May 2013 | Published: 16 May 2013

Fiberlink

The Essentials of OAuth: Key to BYOD
sponsored by Ping Identity Corporation
WHITE PAPER: Discover how you can create a consistent, flexible identity and policy architecture for web apps, web services, devices, and clients communicating with cloud APIs.
Posted: 13 May 2013 | Published: 28 Feb 2013

Ping Identity Corporation

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Computer Weekly special report: Mobile device management and the importance of absolute compliance
sponsored by BlackBerry
WHITE PAPER: Ensuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

BlackBerry

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.

Cloud security concerns you must address
sponsored by HP & Intel®
WHITE PAPER: This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data.
Posted: 01 Aug 2013 | Published: 26 Jul 2013

HP & Intel®

Third Annual Juniper Networks Mobile Threats Report
sponsored by IBM and Juniper
WHITE PAPER: This exclusive paper discusses the major trends that have been gaining momentum in the field of mobile threats, outlining what kinds of attacks are increasing, who is being affected and how these trends could impact future mobile technology development.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

IBM and Juniper

Transitioning to the Private Cloud with Confidence
sponsored by Cisco
WHITE PAPER: Cloud computing may be the future of IT, but it also presents challenges businesses can't afford to overlook. Review the key characteristics, business benefits and barriers when moving to a private cloud.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

Cisco

How to Make Your Business More Flexible & Cost Effective?
sponsored by Panda Security
WHITE PAPER: Access this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Panda Security

Panda Cloud Systems Management: Monitor Datasheet
sponsored by Panda Security
WHITE PAPER: This informative paper discusses a cloud-based IT management solution that anticipates problems proactively, monitoring device activity through mediums such as alerts, dashboards and tickets so you can deal with incidents before they cause problems.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security

Dell DVS Enterprise - Mobile Secure Desktop
sponsored by Dell and VMware
WHITE PAPER: This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Dell and VMware

Cloud security, options and trends
sponsored by CenterBeam
WHITE PAPER: In this brief Q&A, Shahin Pirooz, Chief Technology and Security Officer and Executive Vice president of cloud solutions at CenterBeam, Inc. provides expert analysis of the current state of cloud security. Read now for valuable advice on how you can tailor your cloud infrastructure to meet the needs of your business.
Posted: 28 May 2013 | Published: 28 May 2013

CenterBeam

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Server-Gated Cryptography: Providing Better Security for More Users
sponsored by Thawte Inc.
WHITE PAPER: Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace.
Posted: 10 May 2013 | Published: 10 May 2013

Thawte Inc.

SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER: Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012

Insight Public Sector and Symantec

Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track
WHITE PAPER: This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track

It’s Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track
WHITE PAPER: This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track

How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
sponsored by Infoblox
WHITE PAPER: Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Infoblox

Agentless Security for Vmware Virtual Data Centers and Cloud
sponsored by Trend Micro
WHITE PAPER: This resource will help you understand how applying traditional architectures to virtual environments can hurt your organization's productivity and security posture, and what you need to do in order to secure your virtual environment effectively. Read on to learn more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro
101 - 125 of 180 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement