IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
26 - 50 of 297 Matches Previous Page  |  Next Page
Architecting for Security Resilience
sponsored by Ixia
WHITE PAPER: Network architects understand that resilience starts at the foundation. Review the several strategies to create an inline security architecture and find out which is best for your organizations.
Posted: 22 Mar 2016 | Published: 25 Nov 2015

Ixia

Overcoming Virtual Blind Spots
sponsored by Ixia
WHITE PAPER: Visibility into your network is the only chance you have at mitigating advanced and hidden threats.To overcome east-west traffic blind spots, network security strategies must include virtual tapping into the production virtual network.
Posted: 21 Mar 2016 | Published: 24 Feb 2016

Ixia

Study Shows New Generation of IT Security Threats
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Forget Network Defense - Focus on Offense
sponsored by Ixia
WHITE PAPER: This white paper explains why your network security strategy needs to include testing and training to make sure a product or service is protected before launch. Read on to learn more about an offensive security strategy and what it needs to contain.
Posted: 18 Mar 2016 | Published: 02 Mar 2016

Ixia

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Manufacturing: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper offers a high-level overview of major threats trending across businesses worldwide over the past year. View now for insight into the current threat landscape for the manufacturing industry and offers solutions that can help you better protect your organization.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

IBM

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER: This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016

Imperva

Understanding and Mitigating DDoS
sponsored by Dyn
WHITE PAPER: DoS/DDoS attacks aren't going anywhere and they're only getting harder to detect and remedy. You need a highly resilient DNS infrastructure to mitigate today's sophisticated attacks.This white paper reviews DNS Denial of Service attack concepts and mitigation strategies.
Posted: 11 Mar 2016 | Published: 24 Feb 2016

Dyn

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Next Generation Endpoint Protection Buyer's Guide
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about next-generation endpoint protection that can detect and prevent threats on endpoints using a unique behavior-based approach.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Security Architecture Review: Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper showcases how to provide greater visibility across the ever-expanding attack surface and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 08 Mar 2016 | Published: 16 Dec 2015

LogRhythm, Inc.

What’s New in the Windows 10 Security Log
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, take a look at the new and updated event entries in Windows 10 and learn how to leverage them to identify malicious activity. Continue reading to uncover the specific auditing and logging events recently added by Microsoft and how to turn data into insights.
Posted: 07 Mar 2016 | Published: 27 Jan 2016

LogRhythm, Inc.

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

8 Reasons Streamlining Network Security Should be your Top Priority
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this brief resource to find testimonials from network analysts, IT directors, and security offers on strategies they used to efficiently gain greater visibility into network security.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

Continuous Monitoring and Threat Mitigation with Next-Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, discover how to transform your disparate security technology silos into a more unified and automated system that continuously monitors and mitigates threats with next-generation NAC. Read on to learn how to enable BYOD adoption and support IT-GRC framework specifications.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ForeScout Technologies, Inc.

Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 24 Feb 2016 | Published: 15 Dec 2015

Imperva

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: Many organizations lack accurate threat detection and informed risk-management capabilities. Access this white paper and learn how security intelligence can address these shortcomings – and critical concerns in 6 key areas – to maintain comprehensive and cost-effective information security.
Posted: 18 Feb 2016 | Published: 17 Jun 2015

IBM

Network Forensic Investigations Market Study
sponsored by IBM
WHITE PAPER: In this white paper, find out how forensic tools are being used and where organizations are falling short in their investigative security strategies.
Posted: 18 Feb 2016 | Published: 30 Dec 2014

IBM

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Top 5 Benefits of a Security Operations Center
sponsored by IBM
WHITE PAPER: This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.
Posted: 14 Mar 2016 | Published: 31 Dec 2013

IBM

Advanced Threat Hunting with Carbon Black Enterprise Response
sponsored by Carbon Black
WHITE PAPER: This white paper covers the capabilities necessary to proactively and efficiently hunt for threats across your enterprise. Learn how to expand detection beyond the point of compromise.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black
26 - 50 of 297 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement