IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
26 - 50 of 504 Matches Previous Page  |  Next Page
What a Software Defined Perimeter Means for Your Network Security
sponsored by Cryptzone
WHITE PAPER: Learn how the new zero-trust Software-Defined Perimeter security model overcomes limitations of older perimeter-based Network Access Control (NAC) solutions. Learn how your organization can secure access to on-premises, hybrid and cloud-based resources.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Cryptzone

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate

GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec & Blue Coat Systems

The Smart, Secure Cloud for Singapore
sponsored by Google Cloud
WHITE PAPER: In this white paper, explore about this cloud infrastructure which is designed to build, deploy, and operate services securely at scale.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Google Cloud

GDPR Compliance Risks on Websites
sponsored by The Media Trust
WHITE PAPER: Discover 5 steps to prepare your business for the General Data Protection Regulation (GDPR) which goes into effect in May 2018. Uncover how to create a risk management and GDPR compliance program for your business.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

The Media Trust

Enterprise Security: The IoT Explosion and its Impact
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how the IoT explosion is making enterprises rethink their security strategies and how to ensure that your organization stays ahead of trouble.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Fortinet, Inc.

Manage and Secure Your Supply Chain
sponsored by Unisys
WHITE PAPER: Discover how to secure your supply chain as well as gain insight and visibility into every step of the journey, helping to ensure compliance.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Unisys

Evolving the Mobile Security Architecture Toward 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper prepares your mobile security for 5G by examining the mobile threat landscape, software programmability and cellular standards.
Posted: 07 Jun 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Balancing Flexible Network Access with Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to deploy a flexible and scalable policy, analytics, and reporting system to ensure the security of your network.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: The Wi-Fi Alliance predicts that the number of connected consumer and business devices will reach 38.5 billion in 2020. Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Fortinet, Inc.

How to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to confront the lack of faith many organizations have in their security policy, stay current with regulatory compliance, and keep pace with the evolving and expanding corporate infrastructure.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Fortinet, Inc.

Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Rethinking the Approach To Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

How to Simplify Your GDPR Compliance
sponsored by Commvault
WHITE PAPER: Learn how PGNiG (the leader of the Polish natural gas market) has implemented a platform to deliver end-to-end data management, improved cost efficiency and access, while also reducing business risk.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Commvault

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about 5 key areas where security is commonly lacking and why they are important to shore up to protect your enterprise from today's threats.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to deploy an advanced security approach to combat ransomware using next-generation firewalls, layered security, and proactive threat intelligence.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 05 Jun 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden or GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

How Hybrid Cloud Has Transformed Security of the Data Center
sponsored by TrendMicro
WHITE PAPER: Learn how server security has evolved in the face of cloud computing, and what it takes to secure your company's servers today.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

The Latest Strategies for New Security Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how you can improve your protection and visibility while reducing operating complexity to meet tomorrow's security needs.
Posted: 05 Jun 2017 | Published: 03 Apr 2017

Fortinet, Inc.

Prevent Socially-Engineered Targeted Attacks: Vendor Spotlight
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how anti-spear phishing, anti-whaling, and specialized threat analysis and protection (STAP) features are the best techniques to prevent socially-engineered, targeted cyberattacks, as well as how to evaluate vendors, essential buyer guidance on a leading vendor, and more.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.
26 - 50 of 504 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement