IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesWhite Papers (View All Report Types)
51 - 75 of 187 Matches Previous Page  | Next Page
Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Sharing Sensitive Corporate Documents without Compromising Security and Governance
sponsored by IntraLinks, Inc
WHITE PAPER: This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
Posted: 21 Apr 2014 | Published: 21 Apr 2013

IntraLinks, Inc

Redefining Defense-in-Depth
sponsored by Lumension
WHITE PAPER: This exclusive report examines how traditional protection solutions are decreasing in effectiveness and discusses a new defense-in-depth approach that can keep you endpoints safe from even the most malicious attackers.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

SC Magazine Security Brief: Server Side Risk
sponsored by Lumension
WHITE PAPER: This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Lumension

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar®
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Build a network perimeter for the mobile age
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

NSS Labs:  2013 Next Generation Firewall Security Value Map
sponsored by Fortinet, Inc.
WHITE PAPER: This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

The Next Generation of Firewalls: How to Stop Tomorrow's Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Still Using Proxies for URL Filtering? There's a Better Way
sponsored by Palo Alto Networks
WHITE PAPER: This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Palo Alto Networks

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

Evolving Security Tech Presents New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Modern network security for modern threats
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Citrix

Securing  Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Mitigating Email Virus Attacks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

Select a safe and smart surveillance drive built for your needs
sponsored by Seagate Technology
WHITE PAPER: Check out this informative, concise paper for a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use.
Posted: 14 Mar 2014 | Published: 28 Feb 2014

Seagate Technology

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

GlobalScape
51 - 75 of 187 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement