IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
51 - 75 of 355 Matches Previous Page  |  Next Page
Building A Scalable Remote Access Environment in AWS
sponsored by Palo Alto Networks
WHITE PAPER: Learn about a scalable remote access tool available to AWS users. Inside, you will see how you can protect your mobile workforce, as well as the network as a whole, from threats originating on the web. At the same time, you can minimize your administrative costs associated with remote access and mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

Securely Enabling A Hybrid Cloud in Microsoft Azure
sponsored by Palo Alto Networks
WHITE PAPER: This white paper offers information on a cloud solution that allows you to securely enable a hybrid cloud by incorporating security concepts that includes segmentation policies, much like the prevention techniques used on your physical network.
Posted: 16 Dec 2016 | Published: 01 Nov 2016

Palo Alto Networks

5 Tips to Securely Enable File Sharing and Mobile Productivity
sponsored by BlackBerry
WHITE PAPER: Discover five ways to securely enable fire sharing and mobile productivity. You'll learn how to maximize productivity through easy document sharing and protect those documents on and off device.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

BlackBerry

A Repeatable Cloud-First Deployment Process Model
sponsored by Palo Alto Networks
WHITE PAPER: This informative paper offers guidance to help your organization establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies you may experience.
Posted: 16 Dec 2016 | Published: 01 Nov 2016

Palo Alto Networks

Mobile Security Addressing the Evolving Threat Landscape
sponsored by SOTI Inc.
WHITE PAPER: Discover why organizations are making the decision to move forward with a holistic security framework to mitigate risk – taking into account physical, network, device, and data (app and content level) protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

SOTI Inc.

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Citrix

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

The Suspicious Seven: A Network Visibility Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an outline of seven of the most common types of network blind spots and suspicious activities that every security team needs to be able to see.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

Cisco Systems, Inc.

Secure Enterprise File Sharing and Mobile Content Management
sponsored by BlackBerry
WHITE PAPER: Discover how to utilize a highly mobile and collaborative method of document sharing without sacrificing security. Learn how to protect intellectual property, exchange files through data rooms for M&A, and more.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

BlackBerry

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints
sponsored by Absolute
WHITE PAPER: As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

IDC Technology Spotlight: Modern "Embedded" Endpoint Security
sponsored by Absolute
WHITE PAPER: This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Employees at the Frontline in the Battle Against Ransomware
sponsored by KnowBe4
WHITE PAPER: In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

What Constitutes Effective Security Awareness Training?
sponsored by KnowBe4
WHITE PAPER: Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Firewall Sprawl: Four Security Gaps Exposed
sponsored by FireMon
WHITE PAPER: Discover the truth surrounding next-generation firewalls (NGFWs). Learn the four firewall security gaps that could be putting your organization at risk, and the proper management processes to patch those gaps.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

FireMon

Redefining Next-generation Endpoint Security Solutions
sponsored by Intel Security
WHITE PAPER: Discover how to streamline security operations using next-generation endpoint security. Learn about new tools built for centralization, consolidation and integration that can help you prevent advanced malware from infecting your endpoints and crippling your organization.
Posted: 09 Dec 2016 | Published: 01 Oct 2016

Intel Security

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Team's Time and Talent
sponsored by Intel Security
WHITE PAPER: In this white paper, learn how to take your threat management protocols from reactive to proactive, while reducing complexity and improving operational effectiveness. Access now and discover how you can integrate separate security procedures, automate threat warnings, increase security accuracy with behavioral analytics, and more.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Intel Security

Block Zero-Day Threats Before They Hit Endpoints
sponsored by Intel Security
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4
51 - 75 of 355 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement