IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
126 - 150 of 473 Matches Previous Page  |  Next Page
Business on the Internet - A Scary Reality
sponsored by LogicNow
WHITE PAPER: This white paper shows you different methods cybercriminals can use to ruin your business. The vast majority of infections can be attributed to user error falling victim to their tactics.
Posted: 13 Jan 2016 | Published: 04 Jan 2016

LogicNow

Podcast: Cloud Access Security Brokers: Real World Use-Cases
sponsored by BitGlass
PODCAST: This podcast, the third in a series on the top brokers of cloud security, discusses some real world case studies across a number of industries.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Podcast: Cloud Access Security Brokers: Securing Office 365
sponsored by BitGlass
PODCAST: This podcast contains a description of how you can ensure that your information in Office 365 applications remains secure.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

The Perceived Effectiveness of Traditional Security Solutions in the Cloud
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jan 2016 | Published: 30 Jun 2015

CloudPassage

How Enterprises Are Attacking the IT Security Challenge
sponsored by CloudPassage
WHITE PAPER: This white paper will demonstrate the increasing complexity of managing IT security, spending trends, challenges and vulnerabilities.
Posted: 13 Jan 2016 | Published: 04 Sep 2015

CloudPassage

SANS Institute Survey: Orchestrating Security in the Cloud
sponsored by CloudPassage
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 13 Jan 2016 | Published: 30 Sep 2015

CloudPassage

Financials Risk Report: DDoS Attacks Target Financial Organizations
sponsored by SurfWatch Labs
WHITE PAPER: DDoS attacks will happen to you, but they can be mitigated. Read on to discover how you can safeguard your network from cyber threats and other hazards from compromising employee and customer data.
Posted: 13 Jan 2016 | Published: 26 Aug 2015

SurfWatch Labs

Gartner Report: The Five Characteristics of an Intelligence-Driven Security Operations Center
sponsored by ThreatConnect
WHITE PAPER: Develop an intelligence-driven security operations center (SOC) approach by learning these 5 requirements and modify your security strategy from an exception-based process to a continuous one.
Posted: 13 Jan 2016 | Published: 02 Nov 2015

ThreatConnect

Elevate Cybersecurity: Understanding from the Server Room to the Board Room
sponsored by SurfWatch Labs
WHITE PAPER: Through cyber threat intelligence, you can connect the server room to the board room. Read on to learn how cyber threat inteligence bolsters your security.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

SurfWatch Labs

The Insecurity of Network-Connected Printers: Address Hardcopy Document Security
sponsored by HP Limited
WHITE PAPER: In this exclusive report, you will examine the risks dredged up by insecure printers and other peripheral devices in your business, as well as discover several best-in-class action strategies and practices for addressing end-point device and hardcopy document security.
Posted: 12 Jan 2016 | Published: 31 Oct 2015

HP Limited

Buyer's Guide: User and Entity Behavioral Analytics
sponsored by Interset Software Inc.
WHITE PAPER: This white paper teaches you how to build useful RFI and RFPs, and prepares you for a behavioral-based security analytics purchase.
Posted: 12 Jan 2016 | Published: 09 Dec 2015

Interset Software Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation. Read on and learn what steps to take to achieve proactive IR.
Posted: 08 Jan 2016 | Published: 19 Aug 2015

Blue Coat Systems

Untapped Data Protection Processes
sponsored by Microsoft
EGUIDE: In this three-part expert e-guide, learn how a single pool of data created by merging backup, data recovery, and archive can serve multiple data protection needs—and spawn new ideas about how to use that data. Additionally, learn why a hybrid approach using disk, cloud, and tape is best for most organizations' protection plans.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

Microsoft

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Flipping the Script: Law Firms Hunted by Cybercriminals
sponsored by SurfWatch Labs
WHITE PAPER: This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

SurfWatch Labs

Taming the Beast- Controlling SSH for Security and Compliance
sponsored by FoxT
WHITE PAPER: Are SSH keys the saviors of identity management and access security for your organizations? With several different styles of keys, it's imperative you know the differences and guidelines to using them. Access this white paper to learn more about SSH keys and taking the next step to centralizing SSH session access control to boost security.
Posted: 05 Jan 2016 | Published: 11 Nov 2015

FoxT

Puppet: The Good, Bad, and Ugly for Configuration Management & Security
sponsored by FoxT
WHITE PAPER: This white paper talks you through the strengths and vulnerabilities of running Puppet in your organization for IAM and steps to take to improve security. Read on to learn how to scale Puppet with your user base and keep employees secure.
Posted: 05 Jan 2016 | Published: 02 Dec 2015

FoxT

Smarter Cybersecurity Solutions
sponsored by Webroot
WHITE PAPER: This white paper highlights a cloud-based, cybersecurity solution that enables you to provide your customers with one, simple solution. Learn how to provide your customers with security that will simplify deployment and management, as well as save time and money.
Posted: 31 Dec 2015 | Published: 31 Dec 2015

Webroot

Network Security Monitoring with Real-Time Visibility to Vulnerabilities and Threats
sponsored by Tenable Network Security
WHITE PAPER: This resource discusses the challenges of static security scanning tools and a way to implement a continuous scanning method that can improve your enterprise's resistance to numerous forms of attack.
Posted: 28 Dec 2015 | Published: 28 Jul 2014

Tenable Network Security

Managing Business Risk with Assurance Report Cards
sponsored by Tenable Network Security
WHITE PAPER: This whitepaper explains how you can implement a security product that provides assurance Report Cards and enables security leaders to continuously demonstrate security availability.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Tenable Network Security

The State of Security in Control Systems Today
sponsored by Tenable Network Security
WHITE PAPER: This report focuses on helping ICS professionals identify the challenges facing their peers and their own enterprises.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Creating a Security Program That Exceeds Any Compliance Standard
sponsored by Tenable Network Security
WHITE PAPER: This resource describes the PCI DSS, the standard technical and operational requirements to protect cardholder data.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

PCI DSS Practical Guidelines for Compliance
sponsored by Tenable Network Security
RESOURCE: This resource looks at how retail enterprises can do better at thinking about and actualizing their security.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security
126 - 150 of 473 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement