IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesReports
1 - 25 of 294 Matches Previous Page  | Next Page
Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

ESG Research: Security Management and Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.  This report details the current state of the market and what to expect moving forward.
Posted: 15 Aug 2014 | Published: 30 Jun 2012

Hewlett-Packard Company

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Use Case: Scaling a University's Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: This white paper explores a use case in which a major research university needed to upgrade its intrusion detection system (IDS) to secure 30,000 users and monitor tens of gigabits of internet traffic each second.
Posted: 07 Aug 2014 | Published: 30 Jun 2014

Gigamon

Protect Against Advanced Evasion Techniques
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores a next generation firewall (NGFW) solution that takes on the challenges of network security.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

McAfee, Inc.

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas.
Posted: 31 Jul 2014 | Published: 31 Jan 2013

IBM

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Exposing the Cybersecurity Cracks: Australia
sponsored by Websense, Inc.
WHITE PAPER: The following report learn how better communication and information about cybersecurity, the right investment in skilled personnel, enabling technologies, and the adoption of security measures will minimized the risk of current and emerging cyber threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Websense, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and Intel®

Imperva Security Solutions
sponsored by Imperva
WHITE PAPER: This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Best Practices for Selling Best-of-Breed Solutions
sponsored by Webroot
WHITE PAPER: This white paper describes the many advantages to the best-of-breed approach to selecting technologies from multiple providers, and also offers a number of helpful suggestions for VARs to capitalize on this approach.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

HID Global’s Identity Assurance SMB Solution
sponsored by HID
DATA SHEET: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

Competitive Testing of Web Security Devices
sponsored by Websense, Inc.
WHITE PAPER: This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.
Posted: 30 Jun 2014 | Published: 23 Jan 2014

Websense, Inc.

DDOS Secure - DDoS Mitigation for Your Network and Critical Applications
sponsored by Juniper Networks, Inc.
DATA SHEET: This resource stresses the importance of a fully automated application-layer of protection, and touches upon the necessary security architecture.
Posted: 27 Jun 2014 | Published: 30 Nov 2013

Juniper Networks, Inc.

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

The Definitive Guide to Next Generation Firewalls: Which One is Right for You?
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes an in-depth look at NGFWs, discussing five crucial "must-haves" for firewall success. Tune in now to find out more.
Posted: 23 Jun 2014 | Premiered: Jun 23, 2014

Fortinet, Inc.

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett-Packard Company
1 - 25 of 294 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement