IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesReports
1 - 25 of 262 Matches Previous Page  | Next Page
NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

How-to Build High Performance Security for the Software-Defined Data Center
sponsored by Trend Micro
WEBCAST: This crucial webcast discusses how your organization can build a high-performance security strategy for the virtualized data center, outlining what kind of solutions to look for, what common challenges you might run into, and how to get the most from your virtualized environments.
Posted: 14 Apr 2014 | Premiered: Apr 9, 2014

Trend Micro

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
sponsored by Gartner
BROCHURE: Access the following event brochure to see exactly what will be covered at this year's Gartner Catalyst Conference. Gain a firsthand look at the featured speakers, prices, scheduling, and of course, where you can register.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Gartner

8 Questions to Ask Your Intrusion Security System Vendor
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource outlines 8 questions to ask your intrusion security provider – to ensure your network stays protected.
Posted: 07 Apr 2014 | Published: 30 Sep 2012

Hewlett-Packard Limited

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Testing Report Enterprise Firewalls
sponsored by Cisco
WHITE PAPER: This white paper features a top appliance that includes firewall, VPN, and IPS security services, and doesn't hinder overall performance.
Posted: 03 Apr 2014 | Published: 31 Jul 2012

Cisco

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

IBM

Trusted Storage Vendor Duo Provides Video Surveillance Solutions You Can Count On
sponsored by EMC & Arrow
WHITE PAPER: Check out this exclusive white paper to uncover the key features of the latest comprehensive, certified video surveillance solutions from trusted vendors.
Posted: 02 Apr 2014 | Published: 31 Dec 2012

EMC & Arrow

What Security Pros Need to Know About Cloud
sponsored by CloudPassage
WEBCAST: In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.
Posted: 01 Apr 2014 | Premiered: Apr 1, 2014

CloudPassage

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Case Study: Secure BYOD With an SDN Application
sponsored by Hewlett-Packard Limited
CASE STUDY: This exclusive case study examines how an educational institution was able to take advantage of an SDN application to leverage existing hardware and allow users to connect their personal devices to the network securely, allowing for a remarkable increase in productivity.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Hewlett-Packard Limited

Design Security Policies For #GenMobile
sponsored by Aruba Networks
WHITE PAPER: This exclusive resource discusses how your organization can form an effective mobile strategy designed to help you get the most value from your mobile initiatives.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Aruba Networks

Multifactor Authentication: Removing Risk While Simplifying Processes
sponsored by NetIQ
WHITE PAPER: In this resource, learn how multi-factor authentication brings that extra line of defense your organization needs to protect against malicious hackers.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Assessing the Value of Next-Generation Firewalls (Gov)
sponsored by Dell Software
WHITE PAPER: This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Dell Software

7 Measures of Scalability for your Next-Generation Firewall (Gov)
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 24 Mar 2014 | Published: 23 Aug 2013

Dell Software

Heartland Payment Systems: Neustar UltraDNS Case Study
sponsored by Neustar®
CASE STUDY: This informative case study discusses how a financial transaction service organization was able to utilize a security tool to virtually eliminate downtime through 24/7 monitoring and DDoS protection.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

End Point Security in Medium and Large Organizations
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell, Inc.

Binary Option: Neustar SiteProtect Case Study
sponsored by Neustar®
CASE STUDY: This exclusive case study examines how an independent trading website was able to utilize a security service that protects against DDoS attacks 24/7, mitigating the attack when it occurs and escalating when needed.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Advanced DDoS Protection Service for Ecommerce Businesses
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Protection for Banking and Financial Services
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar®
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

SiteProtect and UltraDNS Solution: Double Your Protection
sponsored by Neustar®
WHITE PAPER: This exclusive paper examines a DNS solution that boasts fast DDoS mitigation responses, protecting both the DNS and HTTP layers so your site can withstand the most aggressive attacks.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®
1 - 25 of 262 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement