IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 473 Matches Previous Page  |  Next Page
The Anatomy of a DDoS Attack
sponsored by Imperva
RESOURCE: View this infographic to see a visual breakdown of how the DDoS criminal system works and how you can protect your organization.
Posted: 12 Feb 2016 | Published: 09 Dec 2015

Imperva

Top 5 Solution Requirements for Account Takeover Protection
sponsored by Imperva
WHITE PAPER: Download this playbook and learn five solution requirements for effective account takeover protection.
Posted: 12 Feb 2016 | Published: 30 Dec 2015

Imperva

Is your sensitive data lurking on the ‘dark Web’?
sponsored by Digital Shadows
WHITE PAPER: This white paper helps you identify and react to the loss or exposure of important information after the fact.
Posted: 12 Feb 2016 | Published: 06 Nov 2015

Digital Shadows

Advancing Network Security through Analytics
sponsored by IBM
WHITE PAPER: In this infographic, uncover the facts of how advanced analytics clears your view into your network to quickly identify real attacks and threats that often go unseen
Posted: 12 Feb 2016 | Published: 30 Dec 2015

IBM

Security Checkup: Diagnose PCI DSS Compliance for Your Hadoop
sponsored by Hortonworks
WHITE PAPER: In this white paper, you will learn how to build PCI compliance into your Hadoop environment. Read this paper to gain all you need to know about Hadoop authentication, perimeter security, customer data protection, and more.
Posted: 12 Feb 2016 | Published: 31 Oct 2015

Hortonworks

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

Case Study: Increasing Bandwidth and Security with Next-Gen Firewalls
sponsored by Fortinet, Inc.
CASE STUDY: In this white paper, learn how one leading UK university with 26,000 students increased network security protection with a next-gen firewall (NGFW).
Posted: 11 Feb 2016 | Published: 30 Dec 2014

Fortinet, Inc.

End Point Lightboard
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will read about the battle security pros fight every day and what new tools they are using to stop hackers.
Posted: 11 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This white paper examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks. Read on to introduce evasion resistant CPU-level detection alongside OS-level sandboxing and key into the rise of known and unknown malware.
Posted: 11 Feb 2016 | Published: 25 Oct 2015

Kingpin Communications

Zero Trust on the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER: This white paper teaches you a "never trust, always verify" security policy that remedies the deficiencies with perimeter-centric strategies and ensures there's no default trust for any entity or user.
Posted: 11 Feb 2016 | Published: 31 Mar 2015

Palo Alto Networks

Virtual Desktop Security: Exploring VDI Features
sponsored by Dell
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell

Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 10 Feb 2016 | Published: 15 Dec 2015

Imperva

Encryption: Quickly Deploy Security Solutions
sponsored by Oracle Corporation
WHITE PAPER: Access this data sheet and learn ways to quickly deploy encryption and other security solutions by centrally managing encryption keys.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Oracle Corporation

Complete Website Security and the Fight Against Organized Cybercrime
sponsored by Symantec Website Security
WHITE PAPER: This white paper explores the numerous types of attacks aiming to take your website down and/or cause a data breach and why organizations can't keep up with this onslaught alone. Read on to find out if comprehensive security could be the answer to blocking malicious threats.
Posted: 10 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Encryption's Risks, Benefits, and Roles in SSL Attacks
sponsored by Symantec Website Security
EGUIDE: In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
Posted: 10 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

Securing Your Network and Application Infrastructure: 24 Experts Share Their Secrets
sponsored by Fortinet, Inc.
WHITE PAPER: This collection of 24 essays, written by experts, covers five major security topics that are more relevant than ever, including: protecting the core of your network, staying ahead of hackers, and 3 more.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Why Next-Generation Firewalls and Sandboxes Are Not Enough
sponsored by OpenDNS
WEBCAST: In this webcast, learn the steps of the kill chain to better understand how to bolster your existing defenses against emerging and advanced threats.
Posted: 10 Feb 2016 | Premiered: Feb 18, 2015

OpenDNS

Forrester Endpoint Thought Leadership Paper
sponsored by Palo Alto Networks
WHITE PAPER: This white papers shows solutions that deliver strong integration between network and endpoint security.
Posted: 10 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

4 Step Get Started Guide to Open Source Security Triage
sponsored by Black Duck Software
WHITE PAPER: This white paper helps you ask the right questions about your open source security vulnerabilities and find answers to them.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Why Enterprises Need a Comprehensive Solution for Website Security
sponsored by Symantec Website Security
WHITE PAPER: This white paper describes the cybersecurity challenges organizations are up against and how a comprehensive security strategy is the key to mitigating data breaches.
Posted: 09 Feb 2016 | Published: 03 Feb 2016

Symantec Website Security

How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
sponsored by Symantec Website Security
EGUIDE: This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
Posted: 09 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

Comprehensive SSL Certificate Management
sponsored by Symantec Website Security
WHITE PAPER: By following six simple steps and the right methodology, proper SSL certificate management is achievable. In this white paper, discover the benefits of proper SSL certificate management.
Posted: 09 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security

Seven Keys to a Secure Data Solution: How to Choose the Right Data Centric Audit and Security Solution
sponsored by Imperva
WHITE PAPER: Read this paper to learn how real-time visibility and blocking maximize protection, why intelligent automation lowers TCO, and what key solution features enable fast time to value.
Posted: 12 Feb 2016 | Published: 16 Dec 2015

Imperva

The Industralization of Hacking: How to Stop Automated Attacks
sponsored by Imperva
WHITE PAPER: View this infographic and learn how you can better defend against such advanced Web-based attacks.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva
1 - 25 of 473 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement