IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 644 Matches Previous Page  |  Next Page
Mac Endpoints Move Into The Enterprise - and Into The Crosshairs of Hackers
sponsored by Palo Alto Networks
WHITE PAPER: Mac computers used to be safe havens—impregnable bunkers—that attackers couldn't figure out how to get into...until now. The threat landscape for Macs is seeing rapid growth. Access this white paper to learn which method is working to prevent malware.
Posted: 17 Aug 2017 | Published: 03 Jul 2017

Palo Alto Networks

Protecting the Hybrid Cloud from Advanced Threats
sponsored by TrendMicro
WHITE PAPER: With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

TrendMicro

Resilience: Protecting Against the Unknown CyberSecurity Threats
sponsored by AdvizeX Technologies
RESOURCE: Just as every castle has weak points, so too does every security strategy. Learn the secrets of this data centric security model to build up your fortifications. It is a five layer defense strategy than enhances your organization's resilience against the waves of attackers and plugs the gaps so nothing can seep through.
Posted: 08 Aug 2017 | Published: 14 Feb 2017

AdvizeX Technologies

SME cyber security is increasingly a business imperative
sponsored by ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

ComputerWeekly.com

The Need for a New IT Security Architecture
sponsored by Citrix
WHITE PAPER: In a recent Ponemon Institute survey, 399 IT and IT security practitioners in the UK were asked about trends in IT security risks and why policies need to evolve in order to deal with threats from disruptive technologies. Access now to uncover their take on these topics and more.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Citrix

Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Tool Overview: HyTrust Multi-Cloud Security and Automated Compliance
sponsored by HyTrust
PRODUCT OVERVIEW: In this technology brief, learn about HyTrust Multi-Cloud Security and Automated Compliance, security software for a multi-cloud infrastructure. Discover key features and benefits, and how you can implement this tool for your own enterprise security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


Your In-Depth 2017 Cybersecurity Report
sponsored by Comstor
RESEARCH CONTENT: Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Comstor

Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication
sponsored by Centrify Corporation
PRODUCT DEMO: Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Rethink Security: A Massive Paradigm Shift in the Age of Access
sponsored by Centrify Corporation
EBOOK: Cyber criminals have increased resources at their disposal to get their hands on both end user and privileged user identities. In this e-book uncover the details about the massive shift occurring in the enterprise landscape and the security challenges this shift creates
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Overcoming the Human Factor with Visibility-Centric Security
sponsored by Gigamon
RESOURCE: Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Gigamon

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient

10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec & Blue Coat Systems

Malware Review Q1 2017
sponsored by PhishMe
WHITE PAPER: Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Secure Your Data and Meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: Every company that takes card payments needs to comply with PCI DSS v3.1, and the requirements can get complicated quickly. Learn how to kill two birds with one stone and secure your organization while setting yourself up to comply with PCI DSS v3.1 requirements.
Posted: 15 Jun 2017 | Published: 31 Oct 2015

TrendMicro

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

Extending Enterprise Security to Public and Hybrid Clouds
sponsored by Juniper Networks, Inc.
WHITE PAPER: Explore a strategy that can help you mitigate the security concerns of public and hybrid cloud environments. Learn how you can gain IPS to detect and block network intrusions, security intelligence, and more.
Posted: 13 Jun 2017 | Published: 30 Dec 2016

Juniper Networks, Inc.

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

Your Guide to Combating Phishing in 2017
sponsored by PhishMe
WHITE PAPER: To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.
Posted: 13 Jun 2017 | Published: 12 Jun 2017

PhishMe

7 Questions to Ask Before Choosing a Threat Intelligence Feed for Web-Based Threats
sponsored by The Media Trust
WHITE PAPER: Learn 7 questions that you need to ask of your threat intelligence feed to determine what's best for your enterprise's security, what makes a truly valuable threat intelligence feed, and more.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

The Media Trust
1 - 25 of 644 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement