IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesWhite Papers (View All Report Types)
51 - 75 of 200 Matches Previous Page  | Next Page
Guarding the Castle
sponsored by Dell Software
WHITE PAPER: This ebook details the sophisticated strategies and tools that today's cybercriminals use to infiltrate your network, and how you can stop them.
Posted: 08 May 2014 | Published: 08 May 2014

Dell Software

Enterprise Mobility 101: Secure Sensitive Data 10 Simple Ways
sponsored by Citrix
WHITE PAPER: This informative paper discusses what elements your mobile security solutions must have in order to ensure that your data is kept safe, providing a list of ten "must-haves" that your organization can use as a framework and a checklist for evaluating mobile vendors.
Posted: 05 May 2014 | Published: 05 May 2014

Citrix

Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

Filling the Threat Management Gateway Void
sponsored by F5 Networks
WHITE PAPER: This guide explores a top threat management solution and how it can provide superior scalability and performance.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

F5 Networks

Sharing Sensitive Corporate Documents without Compromising Security and Governance
sponsored by IntraLinks, Inc
WHITE PAPER: This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
Posted: 21 Apr 2014 | Published: 21 Apr 2013

IntraLinks, Inc

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Threats and Security Best Practices for Adobe Creative Cloud
sponsored by CDW Corporation
WHITE PAPER: Explore this informative whitepaper to learn how Adobe designs and keeps their subscription cloud service secure, and how you can easily make the leap to cloud to give your team a competitive edge in the workplace.
Posted: 18 Apr 2014 | Published: 01 Jan 2014

CDW Corporation

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc. and Intel®

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Taking the Enterprise Mobile: Executive Checklist
sponsored by Citrix
WHITE PAPER: This crucial resource examines a mobile management solution that enables your organization to deliver all of your business critical information over mobile while safeguarding corporate IP, customer and employee data, non-public financial information and business intelligence.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

MDM and beyond: Rethinking mobile security in a BYOD world
sponsored by Citrix
WHITE PAPER: This informative paper discusses how your organization can embrace BYOD with full security and control, providing a simple and streamlined user experience.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks
51 - 75 of 200 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement