IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 307 Matches Previous Page  |  Next Page
Self-Assessment: How Prepared Are You for Advanced Attacks?
sponsored by FireEye
WHITE PAPER: Take this brief self-assessment for an estimate on how prepared you are and suggestions on how to improve.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

Securing Your Business Against SSL-Based Attacks
sponsored by Radware
WHITE PAPER: Access this white paper to uncover the four challenges of defending against DoS-based SSL attacks. Read on to learn why current defense solutions are falling short and the triple layer defense strategy that replaces them.
Posted: 31 Mar 2015 | Published: 10 Apr 2013

Radware

Protecting Critical DNS Infrastructure Against Attack
sponsored by Radware
WHITE PAPER: This white paper delves into the challenges of protecting DNS from DDoS attacks as well as the three new attack techniques. View now to learn a three phase strategy to mitigate these attacks.
Posted: 31 Mar 2015 | Published: 08 May 2013

Radware

Fighting Emerging Cyber-Attacks with a Holistic Security Architecture
sponsored by Radware
WHITE PAPER: This white paper outlines a holistic security architecture strategy designed to fight complex and dynamic attack campaigns. Access now to learn how to explore four attack cases and how to defend against them.
Posted: 31 Mar 2015 | Published: 09 Apr 2014

Radware

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Web Browser Security: Making a Hacker's Job Harder
sponsored by Symantec Corporation
EGUIDE: This expert e-guide delves into the security measures three popular web browsers are incorporating to mitigate human error and risk.
Posted: 31 Mar 2015 | Published: 28 Jan 2015

Symantec Corporation

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business

Top 10 Considerations for Securing Private Clouds
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers 10 considerations for improving private cloud security to keep cybercriminals out and away from your data.  Access now to learn valuable security insights.
Posted: 30 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

The Evolution and Necessity of a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper takes you through the history and development of firewalls and explores each generation's strengths and weaknesses. Read on to learn what characteristics you need in a next-gen firewall to improve your security strategy.
Posted: 27 Mar 2015 | Published: 15 Oct 2014

Juniper Networks, Inc.

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Rethinking Data Protection for MSPs
sponsored by Datto, Inc.
WHITE PAPER: This white paper examines the magnitude of data protection challenges as well as solutions to mitigate risks for consumers in any environment.
Posted: 27 Mar 2015 | Published: 25 Feb 2015

Datto, Inc.

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

Top 3 DNS Monitoring Methods
sponsored by Cloudmark
EGUIDE: This expert e-guide walks you through the top three DNS monitoring methods. Additionally, read on to uncover how defense tactics are revealed through DNS attacks.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Cloudmark

Tackle IAM with a Risk-Based Approach
sponsored by Gemalto
EGUIDE: This expert e-guide takes a look at using a risk-based approach to overcoming the hurdles posed by IAM and the shortcomings of traditional and outdated strategies.
Posted: 26 Mar 2015 | Published: 04 Feb 2015

Gemalto

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

Alternative Strategies to Mobile Device Security
sponsored by Maas360 by IBM
WEBCAST: This webcast offers an alternative to managing an entire mobile device and keeps enterprise data inside an encrypted container.
Posted: 24 Mar 2015 | Premiered: Jan 21, 2015

Maas360 by IBM

5 Important Truths about Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper, explore the five truths that offer answers to those critical questions. Read on to learn how to protect your users and enterprise in the digital workspace age.
Posted: 24 Mar 2015 | Published: 14 Jan 2015

RES Software

Everbridge Case Study: Optimizing Network Security Management
sponsored by F5 Networks
WHITE PAPER: Read more to learn how you can boost your network security and efficiency while also cutting costs.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

F5 Networks

Deploying a Next-Generation IPS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper explains how deploying an IPS behind and application delivery controller (ADC) can optimize IPS performance, simplify IPS management, increase business agility, and improve overall network security. Read more to learn how you can boost your network security and efficiency with one simple solution.
Posted: 23 Mar 2015 | Published: 19 Dec 2014

F5 Networks

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business
1 - 25 of 307 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement