IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 644 Matches Previous Page  |  Next Page
The Cyber Threat Guide
sponsored by LogicNow
EBOOK: This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them.
Posted: 02 Dec 2016 | Published: 30 Nov 2016

LogicNow

Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY: In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it: eliminated false positive message classification, reduced IT help tickets, improved general email security, and assumed granular control over spam and bulk mail classification within Office 365.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Proofpoint, Inc.

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veritas
sponsored by Commvault
WHITE PAPER: Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

HID

Important Modern Trends in Digital Banking
sponsored by HID
WHITE PAPER: Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

HID

The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Why Digital Business Needs a New Approach to Information Security
sponsored by Entrust, Inc.
WHITE PAPER: This resource details how companies are turning to new technologies which establish identity and promote trust in order to extend the reach of their digital businesses. Further, you will learn about today's security environment as it exists inside and outside of the office.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Entrust, Inc.

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veeam Software
sponsored by Commvault
WHITE PAPER: Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

How Many Network Connected Medical Devices Does Your Organization Have?
sponsored by Zingbox
RESOURCE: IT security experts agree that internet-connected medical things (IoMT) are the weakest spots in a hospital's security umbrella. Discover the vulnerabilities of IoMT and the new regulatory standards being developed to patch them.
Posted: 30 Nov 2016 | Published: 05 Oct 2016

Zingbox

5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With EMC Software
sponsored by Commvault
WHITE PAPER: Learn five reasons why you should rethink your data protection and information management software. Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

Give Them Access. NOT a VPN
sponsored by Bomgar Corp.
RESOURCE: Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk.
Posted: 29 Nov 2016 | Published: 29 Nov 2016

Bomgar Corp.

Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER: With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID

Guide & Checklist to Container Security
sponsored by NeuVector
WHITE PAPER: This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

NeuVector

Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

BYOD and Mobile Security Report
sponsored by BitGlass
WHITE PAPER: Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

How Midmarket IT Leaders Can Improve Their Data Security
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures.
Posted: 28 Nov 2016 | Published: 13 Sep 2016

Arctic Wolf Networks, Inc.

A CIO’s Guide for Reducing Security Anxiety
sponsored by BitSight
WHITE PAPER: Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

BitSight

Marisol Enables Secure BYOD
sponsored by BitGlass
CASE STUDY: Learn how Marisol International enabled secure access to corporate data form any mobile device without the need for software agents. Discover how they can now access rich visibility and analytics, enabled selective wipe of corporate data, and more.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

How MDM Software Exposes Your Personal Data
sponsored by BitGlass
WHITE PAPER: Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

The Intricacies of a CASB Revealed
sponsored by BitGlass
WEBCAST: This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.
Posted: 23 Nov 2016 | Premiered: Aug 10, 2016

BitGlass

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

Top 6 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: Discover solutions to your cloud worries and how to maximize the benefits of its adoption. Learn how to overcome: concerns about cloud security, applications that aren't cloud ready, unexpected costs, and more.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Commvault
1 - 25 of 644 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement