IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
51 - 75 of 317 Matches Previous Page  |  Next Page
Powerful Data Protection, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, discover how you can secure all of your devices and applications. Find out how you can effortlessly collaborate with anyone from anywhere.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

Vera

The Expectation of SSL Everywhere
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn about the importance of SSL in securing personal data as it's grown since the Internet's inception and how it's brought cryptography to the common man.
Posted: 27 Jan 2016 | Published: 02 Dec 2015

F5 Networks

Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.
Posted: 26 Jan 2016 | Published: 12 Dec 2013

Digital Guardian

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Client Study: Security Intelligence
sponsored by IBM
WHITE PAPER: This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.
Posted: 25 Jan 2016 | Published: 31 Jul 2015

IBM

Network protection: The untold story
sponsored by IBM
WHITE PAPER: This white paper explores the growing need for next-generation network protection, focusing on the advances that can help combat today’s advanced threats. It introduces how you can gain the critical insight, visibility and control you need to protect the network against emerging threats and targeted attacks.
Posted: 25 Jan 2016 | Published: 16 Sep 2015

IBM

5 Ways to Extend Security Beyond Dropbox
sponsored by Vera
WHITE PAPER: Access this white paper to discover how you can better protect your files in Dropbox. Learn to protect, secure and track all you confidential and sensitive content.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

Vera

Securing the Enterprise with an ADC
sponsored by A10 Networks
WHITE PAPER: To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

A10 Networks

Protecting Your Data in a New Generation Virtual and Physical Environment
sponsored by Acronis
WHITE PAPER: Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment, eliminate single point of failure, and the need for multiple backup solutions.
Posted: 25 Jan 2016 | Published: 15 Oct 2014

Acronis

Complexity and Data Growth Driving Small and Medium-Sized Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Continue reading this white paper to learn how different businesses are utilizing a variety of strategies to manage their cloud, virtual and physical servers. Discover how to manage your hybrid IT environment efficiently.
Posted: 25 Jan 2016 | Published: 18 Jun 2014

Acronis

Clinical Analytics Jumps in Importance
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: Access this expert e-guide to explore the impact of health data analytics on organizations today, and how your peers are leveraging analytics to improve clinical care quality and compliance.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Allscripts Healthcare Solutions

Build a Privacy Organization to Manage Customer Data Effectively
sponsored by AllClear ID
WHITE PAPER: In this white paper, Forrester Research walks you through how to effectively manage, organize and protect customer data.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

AllClear ID

Is Your Team Prepared for a Data Breach?
sponsored by AllClear ID
WHITE PAPER: In this white paper, you will learn how to properly prepare for and respond to any data breaches your enterprise might experience.
Posted: 22 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Making Sense of the Shared Responsibility Model
sponsored by Palerra Inc.
WHITE PAPER: In this white paper, take a closer look at the Shared Responsibility Model and the misconceptions of the cloud service security infrastructure.
Posted: 21 Jan 2016 | Published: 16 Dec 2015

Palerra Inc.

ROI of Visibility and Governance Across Cloud Infrastructure and Applications
sponsored by Palerra Inc.
WHITE PAPER: Uncover the risks your data faces while it is stored in the cloud without the proper security strategy and the costs you face to recover from a breach. This white paper reviews one cloud security approach in depth and examines the defensive benefits and ROI it promises.
Posted: 21 Jan 2016 | Published: 23 Dec 2015

Palerra Inc.

Stopping Attacks at the Identity Perimeter
sponsored by SecureAuth
WHITE PAPER: This infographic will show you how to control your identity risks. Secure Auth IdP will improve protection and detection thus reducing risk.
Posted: 21 Jan 2016 | Published: 09 Dec 2015

SecureAuth

Telenor Gains Greater Insight for Incident Investigation, Troubleshooting and Improved Security
sponsored by Splunk
WHITE PAPER: In this white paper, you will learn how you can gain visibility and operational insight to keep your networks running at peak performance. Discover more about your network infrastructure and its potential for business.
Posted: 21 Jan 2016 | Published: 06 Jan 2016

Splunk

Maastricht University Saves Weeks of Manpower and Delivers Improved Services
sponsored by Splunk
WHITE PAPER: Access this white paper to discover how you can proactively secure your network against phishing attacks.
Posted: 21 Jan 2016 | Published: 06 Jan 2016

Splunk

Evaluating Cloud Security Solution for Office 365
sponsored by Palerra Inc.
WHITE PAPER: Choosing the right Office 365 cloud security approach to defend your data is no simple task. This buyers guide gives you all of the key criteria and must-have features to look for when choosing a strategy.
Posted: 20 Jan 2016 | Published: 30 Dec 2015

Palerra Inc.

The Trust Cost of a Data Breach & How to Prepare
sponsored by AllClear ID
WHITE PAPER: This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Threat Detection Methods and Best Practices
sponsored by Interset Software Inc.
WHITE PAPER: This e-guide will explain to you how the industry is changing and adapting new functionality to protect against ever-evolving attacks. It will teach you how to confidently choose the security tools you'll need that will provide proper functionality and value.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

Interset Software Inc.

Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015

CloudPassage

6 Keys to Eliminating SSL Blind Spots: What You Need for SSL Inspection
sponsored by A10 Networks
WHITE PAPER: It is estimated that 67 percent of Internet traffic will be encrypted by 2016, but that won't stop hackers from using it to their advantage. Learn six ways to ensure your network can stand up to malicious traffic with SSL inspection technology.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

A10 Networks

MSSP Success Checklist
sponsored by AlienVault
WHITE PAPER: This white paper acts as a checklist for MSSP implementation in your organization. Review the template and find out how to centralize management and get organized.
Posted: 20 Jan 2016 | Published: 30 Dec 2015

AlienVault

Evaluating Cloud Security Solution for Amazon Web Services
sponsored by Palerra Inc.
WHITE PAPER: This buyer's guide outlines various requirements you must consider when purchasing an AWS security solution.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

Palerra Inc.
51 - 75 of 317 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement