IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
126 - 150 of 528 Matches Previous Page  |  Next Page
IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: Many organizations lack accurate threat detection and informed risk-management capabilities. Access this white paper and learn how security intelligence can address these shortcomings – and critical concerns in 6 key areas – to maintain comprehensive and cost-effective information security.
Posted: 18 Feb 2016 | Published: 17 Jun 2015

IBM

Network Forensic Investigations Market Study
sponsored by IBM
WHITE PAPER: In this white paper, find out how forensic tools are being used and where organizations are falling short in their investigative security strategies.
Posted: 18 Feb 2016 | Published: 30 Dec 2014

IBM

The Need For a New Network Security Strategy in Today's Mobile Enterprise
sponsored by Aruba Networks
ANALYST REPORT: Large organizations face a difficult challenge on two distinct fronts including, the fight against cyber-criminals and the BYOD trend. Access this white paper to discover how enterprises can mitigate risk in the dynamic environment.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Next Generation Intrusion Prevention System (NGIPS) Test Report
sponsored by IBM
WHITE PAPER: This white paper presents the recent test results of IBM's latest NGIPS network security solution.
Posted: 17 Feb 2016 | Published: 02 Dec 2015

IBM

Vendor Comparisons for Fifteen SIEM Products
sponsored by IBM
WHITE PAPER: This Gartner report can help you navigate the multitude of SIEM options available in today's marketplace and select the one that's right for you. Take a look to learn the strengths, weaknesses, and capabilities of fifteen leading SIEM products.
Posted: 17 Feb 2016 | Published: 20 Jul 2015

IBM

Requirements When Considering a Next-Generation Firewall
sponsored by TechData & Cisco
WHITE PAPER: This white paper explores how next-generation firewalls (NGFW) detect advanced persistent threats and malicious traffic that traditional network perimeter defenses now miss. Continue reading to learn the 6 consideration for choosing an effective NGFW for your organization to mitigate evolving attacks.
Posted: 16 Feb 2016 | Published: 15 Oct 2014

TechData & Cisco

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

10 Things Your Cybersecurity Solution Must Do
sponsored by Palo Alto Networks
WHITE PAPER: As cybercrime evolves, so must your defence strategy to secure your organisation; however, multiple tools often do not mesh perfectly and vulnerabilities are left open. In this white paper, learn the 10 must-have security capabilities for your strategy.
Posted: 15 Feb 2016 | Published: 23 Dec 2015

Palo Alto Networks

Seven Keys to a Secure Data Solution: How to Choose the Right Data Centric Audit and Security Solution
sponsored by Imperva
WHITE PAPER: Read this paper to learn how real-time visibility and blocking maximize protection, why intelligent automation lowers TCO, and what key solution features enable fast time to value.
Posted: 12 Feb 2016 | Published: 16 Dec 2015

Imperva

Top 5 Solution Requirements for Account Takeover Protection
sponsored by Imperva
WHITE PAPER: Download this playbook and learn five solution requirements for effective account takeover protection.
Posted: 12 Feb 2016 | Published: 30 Dec 2015

Imperva

The Industrialization of Hacking: How to Stop Automated Attacks
sponsored by Imperva
WHITE PAPER: View this infographic and learn how you can better defend against such advanced Web-based attacks.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

End Point Lightboard
sponsored by Palo Alto Networks
VIDEO: In this video, you will see the battle security pros fight every day and what new tools are needed to stop hackers.
Posted: 11 Feb 2016 | Premiered: 31 Aug 2015

Palo Alto Networks

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

The top threat intelligence services for enterprises
sponsored by UnitedLex
EGUIDE: If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Targeted Cyber Attacks: Infecting the Victim
sponsored by UnitedLex
EGUIDE: This e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.
Posted: 18 Feb 2016 | Published: 10 Feb 2016

UnitedLex

Cybersecurity Risks Masked by Controversial Vulnerability Counts
sponsored by Symantec Website Security
EGUIDE: In this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.
Posted: 16 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Can A Subscription Ease SSL Certificate Management?
sponsored by Symantec Website Security
EGUIDE: This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

Symantec Website Security

Organizations Struggle through a Tough Year for SSL Protocols
sponsored by Symantec Website Security
EGUIDE: In this expert e-guide, learn the three primary SSL security issues and the common mistakes organizations make when trying to secure their website. Continue reading and discover how to avoid falling prey to the top SSL/TLS threats.
Posted: 16 Feb 2016 | Published: 09 Feb 2016

Symantec Website Security

Find the Right EFSS to Secure Employee File Sharing
sponsored by TrendMicro
EGUIDE: This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

TrendMicro

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Case Study: Increasing Bandwidth and Security with Next-Gen Firewalls
sponsored by Fortinet, Inc.
CASE STUDY: In this white paper, learn how one leading UK university with 26,000 students increased network security protection with a next-gen firewall (NGFW).
Posted: 11 Feb 2016 | Published: 30 Dec 2014

Fortinet, Inc.

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic
126 - 150 of 528 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement