IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
126 - 150 of 651 Matches Previous Page  |  Next Page
Juniper Networks Security Director
sponsored by Juniper Networks, Inc.
WEBCAST: Learn how to improve your organization's threat detection while employing intuitive firewall controls while gaining deep visibility into your network's traffic. Access now to discover how to make your enterprise's security run smoothly and more effectively than ever.
Posted: 04 Nov 2016 | Premiered: Nov 4, 2016

Juniper Networks, Inc.

Case Study: Expedient Keeps Customers' Networks Safe and Highly Available
sponsored by Juniper Networks, Inc.
CASE STUDY: Learn how an IT outsourcing company was able to offer its clients services tailored to their specific needs and accelerate service delivery across the spectrum.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Juniper Networks, Inc.

3 Steps to Get Started with Web Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to make application security (AppSec) manageable. Discover three easy steps to help you get started on your new AppSec strategy.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Cracking the Code on Application Security Success
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

5 Steps to Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn 5 steps to properly plan your firewall, and customize it to not only meet your enterprise's personal needs, but also tackle today's myriad of virtual threats. Gain insight into deploying a next-gen, granulated firewall and a security policy that supports it.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Juniper Networks, Inc.

Protecting the Hybrid Data Center in an Increasingly Virtualized World
sponsored by Juniper Networks, Inc.
WHITE PAPER: Virtualized server workloads have increased in the past year, however most security measures in place today are for purely physical environments. Uncover how to secure your organization's current or future virtualized environments and prevent harmful security tactics.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Juniper Networks, Inc.

Fortinet’s Data Center Solution
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about fast-growing trends and gain new perspective on established trends that are affecting your data center security right now. Gain solid insight into how mobility and BYOD requires faster speeds but risks unauthorized access, server virtualization is becoming the norm but carries risks, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

Addressing Your Cloud Security Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Ease your move to the cloud with the advice offered in this white paper, including an overview of the main classes of cloud architecture, the security consideration of moving to the cloud, key challenges of public and private clouds, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

On-Demand Cloud Security for Microsoft Azure
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the long and the short of on-demand cloud security for Microsoft Azure, BYOL models, single-pane-of-glass cloud orchestration, and more. Gain knowledge of how to keep your organization safe in today's threat landscape.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

Trends and Tactics: How IT Professionals are Approaching AppSec Today
sponsored by Veracode, Inc.
WHITE PAPER: Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Global Banking Giant Streamlines and Strengthens Cybersecurity
sponsored by Dell SecureWorks
CASE STUDY: In this case study, learn how a European bank secured hundreds of locations worldwide and over 13,500 endpoints. All this while dropping their average of 70 billion security events monthly to 20-40 that needed attention and enhancing their regulatory compliance worldwide.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Dell SecureWorks

Automatically Scale Cloud Security with Ease on Amazon Web Services
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to protect your physical, virtual, and cloud workloads across your entire network.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Fortinet, Inc.

Advanced Security at Scale in the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this thorough guide to the cloud, learn how to properly scale security in the public cloud, secure workloads in AWS, comply with the AWS shared-responsibility security model, and more.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Fortinet, Inc.

Cloud Security Playbook: Strategies & Best Practices for Today's Volatile Threat Landscape
sponsored by ThreatStack
WHITE PAPER: Learn strategies, best practices, and expert advice to help your company thrive amidst today's volatile cloud threat landscape.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

ThreatStack

3 Types of Insider Threats to Watch Out For
sponsored by Absolute
WHITE PAPER: Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Absolute

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Securing the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to secure your enterprise's presence on AWS and maximize your use of the public cloud. Access now to gain an in-depth understanding of how to protect both the public and hybrid cloud during and after transitioning from a traditional "brick and mortar" data center.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Fortinet, Inc.

The 2016 Economics of Web Scraping Report
sponsored by Distil Networks
WHITE PAPER: Access this report to learn how web scraper bots are a threat to your online content, how exactly these malicious bots are costing you money, and most importantly, what you can do to protect your content – and your revenue.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Distil Networks

A Guide for Building PCI DSS & HIPAA Compliant Businesses in the Cloud
sponsored by ThreatStack
WHITE PAPER: Where do you begin your cloud compliance journey? In this guide, learn to better understand the complexities of cloud compliance requirements, without all the headaches and confusion. Uncover how compliance differs in the cloud, why security monitoring is critical to achieving compliance, and more.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

ThreatStack

Application Security Testing Vendor Evaluations
sponsored by Veracode, Inc.
ANALYST REPORT: This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.
Posted: 31 Oct 2016 | Published: 06 Aug 2015

Veracode, Inc.

Uncover Often Overlooked Holes in Your Security
sponsored by Dell SecureWorks
WHITE PAPER: Learn how a second opinion on your security policies could be beneficial in ways that could surprise your organization. Access now to discover improved cybersecurity safeguards, how to close hidden exposure to unknown external web connections, and more.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Dell SecureWorks

Transforming Your Security: A New Era in Enterprise Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to increase security effectiveness and reduce complexity by consolidating network security across the entire threat surface. Take a holistic approach, with central visibility and control of the borderless enterprise managed through a single pane of glass.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

The SecOps Playbook
sponsored by ThreatStack
WHITE PAPER: Make SecOps a reality at your organization. The goal of SecOps is to help companies deliver software more efficiently and more securely. This resource offers a brief history of SecOps and six steps to get off the ground with a successful program for your enterprise.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

ThreatStack

User and Entity Behavior Analytics and Adaptive Response
sponsored by Preempt Security
WHITE PAPER: The majority of confirmed data breaches involved attackers posing as legitimate users or users maliciously wielding their access. Learn how to go beyond user and entity behavior analytics with proactive measures to preempt potential insider threats or breaches.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Preempt Security

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits
126 - 150 of 651 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement