IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures White Papers (View All Report Types)
51 - 75 of 240 Matches Previous Page  |  Next Page
Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security Empowers Business
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a way of creating security systems that are a proactive business asset, not a reactive way to slow the business down.
Posted: 07 Apr 2015 | Published: 31 May 2013

Blue Coat Systems

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

TOP 5 CRITICAL CAPABILITIES FOR YOUR MALWARE SANDBOXING STRATEGY
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover the top five criteria of effective malware sandboxing.
Posted: 06 Apr 2015 | Published: 31 Mar 2014

Blue Coat Systems

Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

FireEye

TSL/SSL: Best Practices and Applications
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, explore how TLS works and the 14 best practices for its use. View now to learn why a trusted Certificate Authority is needed and more.
Posted: 02 Apr 2015 | Published: 02 Jan 2014

Symantec Corporation

Automating Defenses Against Increasingly Sophisticated Attacks
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn about the recent developments in DDoS attacks and how you can protect your valuable data from sophisticated cyber-criminals.
Posted: 01 Apr 2015 | Published: 21 Nov 2014

Radware

Self-Assessment: Which Steps Should You Take for Better Security?
sponsored by FireEye
WHITE PAPER: This brief self-assessment will help you to determine what the next steps should be for your organization's security strategy.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

Securing Your Business Against SSL-Based Attacks
sponsored by Radware
WHITE PAPER: Access this white paper to uncover the four challenges of defending against DoS-based SSL attacks. Read on to learn why current defense solutions are falling short and the triple layer defense strategy that replaces them.
Posted: 31 Mar 2015 | Published: 10 Apr 2013

Radware

Protecting Critical DNS Infrastructure Against Attack
sponsored by Radware
WHITE PAPER: This white paper delves into the challenges of protecting DNS from DDoS attacks as well as the three new attack techniques. View now to learn a three phase strategy to mitigate these attacks.
Posted: 31 Mar 2015 | Published: 08 May 2013

Radware

Fighting Emerging Cyber-Attacks with a Holistic Security Architecture
sponsored by Radware
WHITE PAPER: This white paper outlines a holistic security architecture strategy designed to fight complex and dynamic attack campaigns. Access now to learn how to explore four attack cases and how to defend against them.
Posted: 31 Mar 2015 | Published: 09 Apr 2014

Radware

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business

Top 10 Considerations for Securing Private Clouds
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers 10 considerations for improving private cloud security to keep cybercriminals out and away from your data.  Access now to learn valuable security insights.
Posted: 30 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

The Evolution and Necessity of a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper takes you through the history and development of firewalls and explores each generation's strengths and weaknesses. Read on to learn what characteristics you need in a next-gen firewall to improve your security strategy.
Posted: 27 Mar 2015 | Published: 15 Oct 2014

Juniper Networks, Inc.

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Rethinking Data Protection for MSPs
sponsored by Datto, Inc.
WHITE PAPER: This white paper examines the magnitude of data protection challenges as well as solutions to mitigate risks for consumers in any environment.
Posted: 27 Mar 2015 | Published: 25 Feb 2015

Datto, Inc.

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

5 Important Truths about Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper, explore the five truths that offer answers to those critical questions. Read on to learn how to protect your users and enterprise in the digital workspace age.
Posted: 24 Mar 2015 | Published: 14 Jan 2015

RES Software

Everbridge Case Study: Optimizing Network Security Management
sponsored by F5 Networks
WHITE PAPER: Read more to learn how you can boost your network security and efficiency while also cutting costs.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

F5 Networks

Deploying a Next-Generation IPS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper explains how deploying an IPS behind and application delivery controller (ADC) can optimize IPS performance, simplify IPS management, increase business agility, and improve overall network security. Read more to learn how you can boost your network security and efficiency with one simple solution.
Posted: 23 Mar 2015 | Published: 19 Dec 2014

F5 Networks

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business
51 - 75 of 240 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement