IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security ArchitecturesReports
151 - 175 of 286 Matches Previous Page  | Next Page
TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks
sponsored by SearchSecurity.com
EBOOK: Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Equifax: Customer Case Study
sponsored by IBM
CASE STUDY: This exclusive case study examines how a global leader in information solutions applied a comprehensive network intrusion prevention solution and was able to increase revenue through greater customer trust and improve analyst efficiency through immediate action to actionable intelligence.
Posted: 23 Jul 2013 | Published: 22 Jul 2013

IBM

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

SearchSecurity.com

Intergrated Mobile Security for Small and Midsize Businesses
sponsored by SearchSecurity.com
WHITE PAPER: This resource demonstrates how small and medium-sized business can combat the rapidly growing threats inherent in mobile computing. Read now to learn how cloud-based mobile protection can offer robust mobile protection while delivering noticeablecost efficiencies.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

Top 10 Reasons You Don't Need MDM
sponsored by Fiberlink
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 May 2013 | Published: 16 May 2013

Fiberlink

Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Threat Detection (Antivirus Intrusion Prevention)
sponsored by Windstream Communications
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

Windstream Communications

Getting a better grip on mobile devices
sponsored by IBM
WHITE PAPER: This exclusive resource examines how your organization can best adapt to the expanding role of smartphones and tables within the enterprise.  Discover best in class strategies for empowering employees' efficiency and productivity, while also maintaining a positive security posture.
Posted: 13 Aug 2013 | Published: 13 Aug 2013

IBM

E-Guide: Evaluating network security virtualization products
sponsored by Sophos, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

Sophos, Inc.

Information Security Magazine – July/August 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Cloud security concerns you must address
sponsored by HP & Intel®
WHITE PAPER: This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data.
Posted: 01 Aug 2013 | Published: 26 Jul 2013

HP & Intel®

Use BYOD Policies to Integrate Personal Devices Securely
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com highlights the importance of implementing effective BYOD policies to ensure the security of your health care data. Moreover, learn how to embrace BYOD without compromising compliance.
Posted: 01 Aug 2013 | Published: 13 May 2013

HP & Intel®

Third Annual Juniper Networks Mobile Threats Report
sponsored by IBM and Juniper
WHITE PAPER: This exclusive paper discusses the major trends that have been gaining momentum in the field of mobile threats, outlining what kinds of attacks are increasing, who is being affected and how these trends could impact future mobile technology development.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

IBM and Juniper

Transitioning to the Private Cloud with Confidence
sponsored by Cisco
WHITE PAPER: Cloud computing may be the future of IT, but it also presents challenges businesses can't afford to overlook. Review the key characteristics, business benefits and barriers when moving to a private cloud.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

Cisco

Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
sponsored by IBM
WHITE PAPER: IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

IBM

How to Make Your Business More Flexible & Cost Effective?
sponsored by Panda Security
WHITE PAPER: Access this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Panda Security

Panda Cloud Systems Management: Monitor Datasheet
sponsored by Panda Security
WHITE PAPER: This informative paper discusses a cloud-based IT management solution that anticipates problems proactively, monitoring device activity through mediums such as alerts, dashboards and tickets so you can deal with incidents before they cause problems.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security

Panda Security and Delta Wines - Case Study
sponsored by Panda Security
CASE STUDY: Read about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Panda Security

Dell DVS Enterprise - Mobile Secure Desktop
sponsored by Dell and VMware
WHITE PAPER: This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Dell and VMware

Cloud security, options and trends
sponsored by CenterBeam
WHITE PAPER: In this brief Q&A, Shahin Pirooz, Chief Technology and Security Officer and Executive Vice president of cloud solutions at CenterBeam, Inc. provides expert analysis of the current state of cloud security. Read now for valuable advice on how you can tailor your cloud infrastructure to meet the needs of your business.
Posted: 28 May 2013 | Published: 28 May 2013

CenterBeam

The Hay Group Case Study
sponsored by CenterBeam
CASE STUDY: This brief case study takes a look at how the Hay Group, a global management consulting firm, teamed up with a third party to integrate its fleet management and service desk initiatives. Read now to learn how they addressed the needs of three key areas of their IT environment – endpoint management and security, data protection, and helpdesk.
Posted: 22 May 2013 | Published: 22 May 2013

CenterBeam

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Case Study - System One
sponsored by Webroot
CASE STUDY: This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
Posted: 17 May 2013 | Published: 17 May 2013

Webroot

SecureAnywhere Web Security service
sponsored by Webroot
CASE STUDY: This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users.
Posted: 17 May 2013 | Published: 17 May 2013

Webroot

Server-Gated Cryptography: Providing Better Security for More Users
sponsored by Thawte Inc.
WHITE PAPER: Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace.
Posted: 10 May 2013 | Published: 10 May 2013

Thawte Inc.
151 - 175 of 286 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement