IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security Architecture Reports
 
Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

Not Today Zero-Day
sponsored by Intel Security
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

IoT Guardian for the Healthcare Industry
sponsored by Zingbox
WHITE PAPER: Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Zingbox

Ransomware: 3 Seconds to Encryption
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Cloud IAM - TCO
sponsored by IBM
VIDEO: Learn how to stop the monotony of IAM, and instead turn it into a business enabler. By adding enterprise-grade identity-as-a-service (IDaaS), you'll be able to reduce costs by 60%, onboard SaaS apps 100 times faster and generate powerful access management from a single screen.
Posted: 07 Dec 2016 | Premiered: 30 Nov 2016

IBM

Market Guide for Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.
Posted: 18 Nov 2016 | Published: 24 Oct 2016

BitGlass

Security Analytics Brings Data-Driven Security Into The 21st Century
sponsored by FireMon
RESOURCE: With security analytics, security professionals see opportunities for faster incident response, more efficient staff and better business alignment. Learn how you too can streamline security operations using SIEM systems and enable more efficient, data-centric threat analysis.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Why Digital Business Needs a New Approach to Information Security
sponsored by Entrust, Inc.
WHITE PAPER: Access this white paper to learn how companies are turning to new identity-centric, security technologies like PKI in order to extend the reach of their digital businesses and remain secure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Entrust, Inc.

5 Keys to Boosting Cloud Security Confidence
sponsored by BitGlass
WEBCAST: Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.
Posted: 22 Nov 2016 | Premiered: Nov 22, 2016

BitGlass

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Team's Time and Talent
sponsored by Intel Security
WHITE PAPER: In this white paper, learn about a program that takes your threat management protocols from a reactive to a proactive, while reducing complexity and improving operational effectiveness. Access now and discover how you can integrate separate security procedures, automate threat warnings, increase security accuracy with behavioral analytics, and more
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement