IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesReports
1 - 25 of 290 Matches Previous Page  | Next Page
Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

Web Applications Under Attack: How Network Security Solutions Leave You Exposed
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls—web application firewalls and next generation firewalls—measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP).
Posted: 30 Oct 2014 | Published: 31 Dec 2013

Imperva

Onapsis Security Platform Datasheet
sponsored by Onapsis
WHITE PAPER: Organizations today have little to no visibility into the actions being performed on or against their SAP systems either historically or in real time. The following white paper explores this issue and offers insight into a detection and response solution that can help detect abnormalities within SAP and finally provide peace of mind from attacks.
Posted: 28 Oct 2014 | Published: 28 Oct 2014


Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks

Comparing 6 Web Application Firewall Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: This helpful resource from NSS Labs provides detailed comparisons and analyses of web application firewalls from Barracuda, Citrix, F5, Fortinet, Imperva, and Sangfor.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Fortinet, Inc.

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Delivering Threat Intelligence to Security Technology Providers and Large Organizations
sponsored by Webroot
WHITE PAPER: One of the best ways to address poor incident detection and incident response is with greater use of information-driven security based upon internal security analytics and external threat intelligence. So what technology and strategies do you need to enable this insight? Read this white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

How Resellers can become the Trusted Advisors
sponsored by Webroot
WHITE PAPER: While the specific issues Value Added Resellers face vary widely, there is one universal challenge that every reseller has to undertake—positioning itself as a trusted advisor to its customers. So in short, how do you do it? Read the following white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

Prolexic Quarterly Global DoS Attack Report
sponsored by Akamai Technologies
WHITE PAPER: The following case study intends to illustrate global view of security threats, vulnerabilities and trends surrounding DDoS attacks. In addition, it covers the feasibility of building botnets through the compromise of large installs of commonly used frameworks.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Weighing Risk Against the Total Cost of a Data Breach: Can You Afford a Web Application Layer Attack?
sponsored by Akamai Technologies
WHITE PAPER: This white paper presents a proven, industry-standard approach to determining a company's risk of web application cyber-attacks. The provided equation can help you justify the cost of proactively deploying cybersecurity products and services to protect against web application attacks, including those that could lead to data breaches.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Quick Wins with Website Protection Services
sponsored by Akamai Technologies
WHITE PAPER: The following white paper examines the current state of website security and demonstrates the all-too-common error of neglecting security in this realm. Additionally, lean about a website protection solution that can quickly add measurable security to your web presence with a price for enticing than deploying an in-house solution.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

A Guide To Multi-Layered Web Security
sponsored by Akamai Technologies
WHITE PAPER: Unfortunately, multilayered web security is not as straightforward as businesses would like, which makes thwarting security attacks like the Heartbleed virus even more stressful. So what does it take to do it? Consult this guide to uncover the strategies and technology needed to deploy a powerful, multilayered web security project.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Akamai Technologies

Sharing the Blame: How Companies are Collaborating on Data Security Breaches
sponsored by Akamai Technologies
WHITE PAPER: The following report explores the ways in which organizations are collaborating to deal with the disclosure of data security breaches, who they are partnering with, and the technology they are leveraging.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Akamai Technologies

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks
sponsored by SearchSecurity.com
EBOOK: Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

SearchSecurity.com

How to Create Firewalls for Your Virtual Machines in the Public Cloud
sponsored by Zentera Systems Inc.
VIDEO: This exclusive video covers a fabric that will allow you to build firewalls for your individual virtual machines in a public cloud.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

Zentera Systems Inc.

Setting a Strategic Agenda for the 'Upwardly Mobile' Enterprise
sponsored by IBM
WHITE PAPER: If your organization doesn't have a well-defined mobile strategy, you're not alone. Read this paper for tips from IBM.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.
1 - 25 of 290 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement