IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
126 - 150 of 547 Matches Previous Page  |  Next Page
University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USMTM
sponsored by AlienVault
WHITE PAPER: University of Wisconsin–Superior's IT team was looking to replace their outdated intrusion prevention system. In this case study, discover how they were able to overcome budget challenges in order to find a solution that still met the security needs of their large network.
Posted: 19 Aug 2016 | Published: 19 Aug 2016


Exploring the Security Risks of Healthcare Orgs
sponsored by OpenDNS
PODCAST: Half of hospitals in the United States have been hit with ransomware. Learn how hospitals are often set up to fail and what your healthcare organization can do to overcome security shortcomings.
Posted: 19 Aug 2016 | Premiered: Jul 1, 2016


Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

Don't Let The Cloud Cast A Shadow On Security
sponsored by Cisco Systems, Inc.
RESOURCE: Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

Cisco Systems, Inc.

The Bot Problem: Managing Bot Traffic in the Travel Industry
sponsored by Akamai
WHITE PAPER: In this white paper discover how bots affect search visibility, aggregation, and on-site performance, and more. Learn what can be done to respond to these bots and achieve the goals for your site.
Posted: 16 Aug 2016 | Published: 16 Aug 2016


How to Conquer the Biggest AWS Adoption Challenges
sponsored by Palerra Inc.
WHITE PAPER: Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

Protect Your Websites and Web Applications from Downtime and Data Theft
sponsored by Akamai
WHITE PAPER: In today's hyperconnected world, enterprises need to be able to innovate without fear. Learn how to reduce your risk for a cyberattack, but also maintain performance if a cyberattack should hit.
Posted: 12 Aug 2016 | Published: 01 Jul 2016


Use Secure Cloud and Scalability to Revolutionize B2B Payments Market
sponsored by Armor
WHITE PAPER: Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.
Posted: 12 Aug 2016 | Published: 12 Aug 2016


Achieve secure wireless networking in the classroom
sponsored by Fortinet, Inc.
RESOURCE: Affordable laptops and tablets in the classroom plus ubiquitous Wi-Fi can turn the dream of one-to-one computing into reality, but not without challenges in security and application control. Access this resource now to learn how you can support BYOD, guard against malicious attacks, malware and viruses, and completely control application usage.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Insider Threat Spotlight Report
sponsored by Palerra Inc.
ANALYST REPORT: In this extensive report, discover a detailed breakdown of how insider threats to enterprise data are on the rise and tap into some of the best ways to mitigate this risk to business data. Learn key trends that create vectors of attack for insiders, what the top offenders look like, which assets are most at risk, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Insider Threat Spotlight Report
sponsored by Exabeam
WHITE PAPER: High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.
Posted: 10 Aug 2016 | Published: 01 Jul 2016


Cyber Security Awareness with PolicyTech
sponsored by Navex Global
VIDEO: Learn how to save time and money in training employees while ensuring your organization meets legal and regulatory requirements. Access now to discover more about why distributing your security policy has never been easier.
Posted: 29 Jul 2016 | Premiered: 01 Jun 2016

Navex Global

Enterprise cloud applications – can we trust them?
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

The Cloud: Securing Your Enterprise both Before and After Migration
sponsored by Armor
EGUIDE: In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.
Posted: 26 Jul 2016 | Published: 25 Jul 2016


Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

SSL Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Businesses Should Begin Preparing for the Death of the Password
sponsored by Gigya
ANALYST REPORT: Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.
Posted: 20 Jul 2016 | Published: 20 Jul 2016


Two Approaches to Cloud Security: API vs. Proxy
sponsored by Palerra Inc.
RESOURCE: Uncover the difference between two different Cloud Access Security Broker (CASB) deployment strategies, API and Proxy, and what they can do to provide cloud security for your enterprise. You'll find a comparison of their features, learn how to decipher multimode CASBs, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

State of PAM 2016
sponsored by Thycotic
ANALYST REPORT: In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016


Managing Information Security Amid New Threats: A Guide for CIOs
sponsored by OpenDNS
EGUIDE: In this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.
Posted: 15 Aug 2016 | Published: 11 Aug 2016

126 - 150 of 547 Matches Previous Page    4 5 6 7 8 9    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement