IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security Architecture Reports
 
Email Phishing: The Impostor in the Machine
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox
Posted: 04 Apr 2016 | Published: 16 Mar 2016

Proofpoint, Inc.

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

Tackle IAM Issues with Risk-Based Identity Governance
sponsored by Hitachi ID Systems, Inc.
EGUIDE: Today, the key to securing the enterprise rests in an alternative IAM approach. IAM experts Warwick Ashford and Michele Chubirka present the benefits of risk-based IAM and using identity governance to secure applications and users.
Posted: 29 Mar 2016 | Published: 16 Mar 2016

Hitachi ID Systems, Inc.

Next-Generation Security Platform for Manufacturing
sponsored by Palo Alto Networks
WHITE PAPER: Discover the specific threats facing network security specialists in the manufacturing industry, and which next-generation tools can keep your networks safe.
Posted: 13 Apr 2016 | Published: 31 Dec 2014

Palo Alto Networks

What’s New in the Windows 10 Security Log
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, take a look at the new and updated event entries in Windows 10 and learn how to leverage them to identify malicious activity. Continue reading to uncover the specific auditing and logging events recently added by Microsoft and how to turn data into insights.
Posted: 07 Mar 2016 | Published: 27 Jan 2016

LogRhythm, Inc.

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

Deep Dive Session: Security in Servers & Networking
sponsored by Rackspace
WEBCAST: This webinar explores security in servers and networking. Access now and learn about the impact an architecture comprised of dedicated physical server and networking components has on predictability of performance and security for non-cloud native workloads.
Posted: 08 Mar 2016 | Premiered: Jan 13, 2016

Rackspace

Mobile Learning Environment
sponsored by Avaya
WHITE PAPER: There are 4 crucial elements to ensuring safe school environments. Open this infographic to learn about each element and how they'll need to be addressed to ensure security.
Posted: 28 Mar 2016 | Published: 15 Mar 2016

Avaya

Evaluating the Expanding Cloud Access Security Broker Market
sponsored by Blue Coat Systems
EGUIDE: In this expert e-guide, learn how the CASB market is evolving and what to look for in a CASB. Also inside, discover a helpful evaluation guide and review one platform in particular to find out how it measures up.
Posted: 01 Mar 2016 | Published: 10 Feb 2016

Blue Coat Systems

Can A Subscription Ease SSL Certificate Management?
sponsored by Symantec Website Security
EGUIDE: This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

Symantec Website Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement