IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
176 - 200 of 632 Matches Previous Page  |  Next Page
From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE: Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

Guide to Encrypted Traffic Management
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Maintaining Compliance for the Cloud Generation
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn what regulations govern compliance in the cloud how to maintain them. Access this white paper now to discover the liability companies have from using various cloud apps, what industries are most affected by cloud compliance issues, how to ensure cloud vendors conform to compliance guidelines, and more.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Symantec & Blue Coat Systems

Security Overview: SSL/TLS Traffic
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover an overview of Secure Socket Layer (SSL)/ Transport Layer Security (TLS) technology and find examples of how you can manage the increasing SSL traffic within your enterprise network and protect it from hidden threats.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

The Case for Modern Network Security Operations
sponsored by Forcepoint
WHITE PAPER: In this ESG white paper, examine how network security operations are completely fraught with challenges that need to be met in order for your organization to effectively protect itself.
Posted: 16 Nov 2016 | Published: 30 Sep 2016

Forcepoint

Modern Cybercrime - What's Happening, Why it's Happening and How You Can Respond
sponsored by Trustwave
WHITE PAPER: Learn about recent instances of cyberattacks to better understand how they operate and what damage they cause. Stay ahead of cybercriminals and out of tomorrow's headlines by ensuring you're operating securely and your incident response plan is ready for prime time.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Trustwave

Real World Security Risks Embedded In Your Cloud Strategy
sponsored by Symantec & Blue Coat Systems
RESOURCE: Learn how to harness the cloud and mitigate the many risks associated with it. Discover how the cloud fits in with current IT industry trends, who is using the cloud (hint: over 50% of the Fortune 500), the top 3 cloud threats, and more.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Symantec & Blue Coat Systems

Evaluation Checklist: Managed Security Services Provider
sponsored by Trustwave
WHITE PAPER: Discover what you should expect out of your next Managed Security Service Provider (MSSP) with this evaluation checklist. This tool will help you compare and contrast potential MSSPs so you can decide which one best suits your needs.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

Build a Defense-in-Depth Security Approach
sponsored by TrendMicro
WHITE PAPER: Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.
Posted: 14 Nov 2016 | Published: 01 Oct 2016

TrendMicro

IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy
sponsored by SAS
WHITE PAPER: Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

SAS

Beyond Next-Gen: Defining Future-ready Endpoint Security
sponsored by TrendMicro
WHITE PAPER: In this ESG report, discover how to achieve your desired level of high fidelity to get the most out of your endpoint protection. Learn how other organizations are buying their endpoint protection and make determinations for your own endpoint solution moving forward.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Protecting Smart Devices and Application Throughout the IoT Ecosystem
sponsored by PTC
WHITE PAPER: Discover new techniques and best practices for securing your network in today's hyper-connected environments. Following these best practices will make it possible to develop connected products that deliver real business value to your organization and its customers while protecting against intruders.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

PTC

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

In-Depth Reviews for SIEM Buyers
sponsored by AlienVault
WHITE PAPER: Explore a collection of resources and reports that dive deep into what a SIEM solution needs to provide and how to evaluate the right solution for your organization. Specifically, get an overview and third-party reviews for AlienVault's SIEM platform.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

AlienVault

How to Build a Security Operations Center (on a Budget)
sponsored by AlienVault
WHITE PAPER: In this in-depth guide, get step-by-step instructions on how to create and run an enterprise-level security operations center by combining 4 key ingredients – and without breaking the bank.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

AlienVault

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by Intel Security
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Intel Security

Top Benefits of Integrated Endpoint Protection
sponsored by TrendMicro
EGUIDE: When implementing endpoint security, is it better to buy standalone products or an endpoint security suite? Access this e-guide to learn the benefits of integrated endpoint protection software and find out for yourself.
Posted: 11 Nov 2016 | Published: 10 Nov 2016

TrendMicro

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

New Data Classifications Vital to Information Governance and Security
sponsored by STEALTHbits
EGUIDE: In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

STEALTHbits
176 - 200 of 632 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement