IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 447 Matches Previous Page  |  Next Page
Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

Excluding Frequent from Analysis for Smarter Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper delves into the art and science of whitelisting frequent entities to detect abnormalities faster and with greater ease. Read on and learn how to craft a dynamic whitelist for your threat detection strategy to never miss an abnormality or hidden attack again.
Posted: 05 Feb 2016 | Published: 04 May 2015

Prelert

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Your Next Digital Security Guard Should be More like RoboCop
sponsored by Prelert
WHITE PAPER: In this white paper, discover how to use machine intelligence to patch major network security vulnerability gaps and mitigate human errors. Continue reading to learn how to identify abnormal and potentially malicious activity as it occurs.
Posted: 05 Feb 2016 | Published: 24 Jun 2015

Prelert

Cisco Advanced Malware Protection Leads Again in NSS Test
sponsored by Cisco
WHITE PAPER: In this white paper, you will learn how to reduce both detection time and remediation time. Go beyond point-in-time detection with your security solutions.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper explores micro-segmentation, a new and popular network security approach, and how to stop hackers from moving laterally within the data center.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Optimize Anomaly Detection: Insider Tips for Success
sponsored by Prelert
WHITE PAPER: This brief white paper teaches you how to properly backfill historical data to build baseline analyses for ongoing anomaly searches. View now for expert anomaly detection tips and tricks.
Posted: 04 Feb 2016 | Published: 06 Jul 2015

Prelert

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

The Evolution of Vendor Risk and Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper talks about the Financial Service industry's pioneering in developing risk management practices.
Posted: 04 Feb 2016 | Published: 31 Jan 2016

BitSight

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centered and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

SANS_A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WEBCAST: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation.
Posted: 04 Feb 2016 | Premiered: Dec 31, 2015

Blue Coat Systems

Cisco 2016 Annual Security Report
sponsored by Cisco
WHITE PAPER: This security report presents research, insights and perspectives highlighting the challenges that defenders face in blocking attackers.
Posted: 04 Feb 2016 | Published: 01 Feb 2016

Cisco

Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: This white paper discusses attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

BitSight

See, Understand, and Swiftly Respond to Advance Threats
sponsored by Blue Coat Systems
WHITE PAPER: This white paper stresses the imprtance of network visibility and how real-time analysis enables you to see, understand, and respond to emerging and incoming security threats.
Posted: 03 Feb 2016 | Published: 16 Apr 2014

Blue Coat Systems

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
WEBCAST: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 02 Feb 2016 | Premiered: Dec 8, 2015

Blue Coat Systems

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Prevent Cybercriminals from Taking Down your Business
sponsored by Microsoft
WHITE PAPER: This infographic reveals what companies are doing right (and wrong) in their security initiatives, and what it's costing them. Uncover technologies that not only build bigger walls against attacks, but also lock criminals out altogether.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Microsoft

Behavioral Analytics: Telling the Stories Hidden in IT Security and Operations Data
sponsored by Prelert
WEBCAST: In this webcast, learn how to go beyond anomaly detection with behavioral analytics and insights. Discover how to investigate commonalities between anomalies to better understand and identify potential threats.
Posted: 02 Feb 2016 | Premiered: Jan 27, 2016

Prelert

Behavioral Analytics: Let Your Data Tell the Story
sponsored by Prelert
WEBCAST: In this brief webcast, learn how to analyze log data, find anomalies, and like them together faster. Uncover the steps to understand not only what happened in an incident, but how it happened as well. View now to learn more.
Posted: 02 Feb 2016 | Premiered: Jan 20, 2016

Prelert

Digital Guardian for Data Protection and Export Control Compliance
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn about context-aware protection and its capability to address a wide range of real-world cases for export controlled products and services.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 01 Feb 2016 | Published: 19 Aug 2015

Blue Coat Systems

Prelert Analytics vs Holt-Winters Filtering
sponsored by Prelert
WHITE PAPER: In this technical brief, explore the comparison between two real time series data modeling and anomaly detection strategies. Learn how anomaly detection on real time series data requires specific modeling capabilities and review the results obtained with each approach.
Posted: 01 Feb 2016 | Published: 30 Dec 2015

Prelert

Intro to Faster Threat Intelligence
sponsored by OpenDNS
WEBCAST: In this webcast, learn how to dust for clues hackers leave behind in your network to remedy security threats before they escalate to issues.
Posted: 04 Feb 2016 | Premiered: Sep 22, 2015

OpenDNS
1 - 25 of 447 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement