IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security Architecture Reports
 
Case Study: Deploying Secure Public WiFi
sponsored by Dell Software
CASE STUDY: This brief case study examines how one Australian city council enabled secure WiFi in all public buildings using a next-gen firewall to protect endpoints, users, and sensitive data. Access now to learn how to mitigate mobile and network threats.
Posted: 27 May 2015 | Published: 13 May 2015

Dell Software

Holistic Protection against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: This white paper discusses how you can design security customized for your network and for fighting off potential targeted attacks.
Posted: 07 May 2015 | Published: 31 Oct 2014

Trend Micro

How BlackBerry Addresses BYOD Security Issues
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 22 Apr 2015 | Published: 04 Dec 2014

BlackBerry

HP Secure Print Analysis Tool
sponsored by Hewlett-Packard Company
ASSESSMENT TOOL: Focus your print security strategy with the HP Secure Print Analysis tool. This quick assessment of your current print security infrastructure will tell you where to strengthen print security, using best practices in mobile print security, printer hard drive encryption, fleet management, and more.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER: This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015

Absolute Software

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

Deploying a Next-Generation IPS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper explains how deploying an IPS behind and application delivery controller (ADC) can optimize IPS performance, simplify IPS management, increase business agility, and improve overall network security. Read more to learn how you can boost your network security and efficiency with one simple solution.
Posted: 23 Mar 2015 | Published: 19 Dec 2014

F5 Networks

It's Time to Identify and Confront Today's Data Center Security Challenges
sponsored by VMware
WHITE PAPER: In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.
Posted: 23 Apr 2015 | Published: 29 Dec 2014

VMware

New Capabilities of Next-Gen Firewalls
sponsored by Dell Software
VIRTUAL ENVIRONMENT: This virtual environment explores why firewalls that are only 2-3 years old are failing to protect organizations from malware and other cybercrime attacks.
Posted: 01 Jun 2015 | Premiered: 10 Dec 2014

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement