IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
101 - 125 of 464 Matches Previous Page  |  Next Page
SANS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. Learn how the AlienVault USM platform maps to each of the SANS CSCs.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

AlienVault

Staying ahead of threats with global threat intelligence and automated protection
sponsored by IBM
WHITE PAPER: In this white paper you will discover how to stay ahead of the ever evolving security landscape and keep your precious data safe.
Posted: 19 Jan 2016 | Published: 30 Jun 2015

IBM

Security Breaks DevOps: Here's How Fix It
sponsored by CloudPassage
WEBCAST: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 18 Jan 2016 | Premiered: Dec 30, 2015

CloudPassage

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

Combating the Next Generation of Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper invites you to take a look beyond traditional network security measures. Read on and discover how a cloud-based sandbox with full system emulation can detect and block advanced malware and zero day attacks.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

WatchGuard Technologies, Inc.

Enhacing IAM and Authentication with Threat Intelligence
sponsored by SecureAuth
WHITE PAPER: What happens when two authentication leaders unite to create a new platform to advance threat detection? You'll have to read this white paper to find out. Read on now to learn how to use keystroke analysis to detect signs of compromised credentials earlier.
Posted: 18 Jan 2016 | Published: 17 Nov 2015

SecureAuth

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.
Posted: 18 Jan 2016 | Premiered: Jan 6, 2016

AlienVault

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, experts will discuss today's rapidly evolving cyber threat landscape and offer solutions to detect incursions early so your company can respond quickly and avoid loss.
Posted: 18 Jan 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

Malware Detection: How to Spot Infections Early with AlienVault USM
sponsored by AlienVault
WEBCAST: With so many complicated threats to manage your company needs a simplified solution. Unified security managements (USM) is a single platform for simplified, accelerated threat detection, incident response and policy compliance.
Posted: 18 Jan 2016 | Premiered: Dec 16, 2015

AlienVault

2016 Security Predictions eBook
sponsored by WatchGuard Technologies, Inc.
EBOOK: Examine the 10 cybersecurity predictions for 2016 to prepare yourself for the attacks that are coming.
Posted: 15 Jan 2016 | Published: 15 Dec 2015

WatchGuard Technologies, Inc.

Unlocking the Promise of UTM-Enabled Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper compares the efficacy of network security tools vs. unified threat management. Read more about the roadblocks to UTM adoption and if it's necessary for your organization in order to block malicious network threats.
Posted: 15 Jan 2016 | Published: 02 Dec 2015

WatchGuard Technologies, Inc.

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage

Best Practices for Securing AWS Instances
sponsored by CloudPassage
WEBCAST: In this webcast, security pros will explore the security challenges AWS computing presents and they offer 7 best practices to secure cloud environments faster. Watch now to learn more.
Posted: 15 Jan 2016 | Premiered: Dec 4, 2015

CloudPassage

Top 5 Network Security Challenges Faced By the Distributed Enterprise
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this white paper, you will discover how to deploy and manage consistent, enterprise-grade network security and secure wireless networks across all your remote locations. In addition, you'll be able to visibly track network health, threats and compliance issues to assist in proactive business decisions.
Posted: 14 Jan 2016 | Published: 16 Dec 2015

WatchGuard Technologies, Inc.

Business on the Internet - A Scary Reality
sponsored by LogicNow
WHITE PAPER: This white paper shows you different methods cybercriminals can use to ruin your business. The vast majority of infections can be attributed to user error falling victim to their tactics.
Posted: 13 Jan 2016 | Published: 04 Jan 2016

LogicNow

Podcast: Cloud Access Security Brokers: Real World Use-Cases
sponsored by BitGlass
PODCAST: This podcast, the third in a series on the top brokers of cloud security, discusses some real world case studies across a number of industries.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Podcast: Cloud Access Security Brokers: Securing Office 365
sponsored by BitGlass
PODCAST: This podcast contains a description of how you can ensure that your information in Office 365 applications remains secure.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

The Perceived Effectiveness of Traditional Security Solutions in the Cloud
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jan 2016 | Published: 30 Jun 2015

CloudPassage

How Enterprises Are Attacking the IT Security Challenge
sponsored by CloudPassage
WHITE PAPER: This white paper will demonstrate the increasing complexity of managing IT security, spending trends, challenges and vulnerabilities.
Posted: 13 Jan 2016 | Published: 04 Sep 2015

CloudPassage

SANS Institute Survey: Orchestrating Security in the Cloud
sponsored by CloudPassage
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 13 Jan 2016 | Published: 30 Sep 2015

CloudPassage

Financials Risk Report: DDoS Attacks Target Financial Organizations
sponsored by SurfWatch Labs
WHITE PAPER: DDoS attacks will happen to you, but they can be mitigated. Read on to discover how you can safeguard your network from cyber threats and other hazards from compromising employee and customer data.
Posted: 13 Jan 2016 | Published: 26 Aug 2015

SurfWatch Labs

Gartner Report: The Five Characteristics of an Intelligence-Driven Security Operations Center
sponsored by ThreatConnect
WHITE PAPER: Develop an intelligence-driven security operations center (SOC) approach by learning these 5 requirements and modify your security strategy from an exception-based process to a continuous one.
Posted: 13 Jan 2016 | Published: 02 Nov 2015

ThreatConnect

Elevate Cybersecurity: Understanding from the Server Room to the Board Room
sponsored by SurfWatch Labs
WHITE PAPER: Through cyber threat intelligence, you can connect the server room to the board room. Read on to learn how cyber threat inteligence bolsters your security.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

SurfWatch Labs

The Insecurity of Network-Connected Printers: Address Hardcopy Document Security
sponsored by HP Limited
WHITE PAPER: In this exclusive report, you will examine the risks dredged up by insecure printers and other peripheral devices in your business, as well as discover several best-in-class action strategies and practices for addressing end-point device and hardcopy document security.
Posted: 12 Jan 2016 | Published: 31 Oct 2015

HP Limited
101 - 125 of 464 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement