IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
176 - 200 of 650 Matches Previous Page  |  Next Page
An Introduction to the Security Advantages of Mirco-Segmentation
sponsored by VMware
WHITE PAPER: Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.
Posted: 29 Mar 2017 | Published: 30 Nov 2016

VMware

Micro-segmentation: Security for Every Data Center
sponsored by VMware
WHITE PAPER: Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID

A Network Manager's Guide to Ransomware
sponsored by Cisco Umbrella
RESOURCE: Learn the most common methods of operation for ransomware and what your organization can do to reduce your vulnerability to it. Also discover handy flowcharts detailing the timelines of web-based and email-based ransomware infections, the components of a strong prevention strategy, and more.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

Cisco Umbrella

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID

Modernizing Your Data Center's Security
sponsored by VMware
WHITE PAPER: The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Secure Identity Experience in the Age of Connected Everything
sponsored by HID
WHITE PAPER: Discover how industry expert Christian Christiansen of IDC views security in the age of mobile workforces, smartphone apps, and cloud-based corporate information.
Posted: 24 Mar 2017 | Published: 31 May 2016

HID

4 Market Trends Driving Mobile Banking
sponsored by HID
EBRIEF: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Top 5 Considerations: What to Look For in Mobile Banking Security
sponsored by HID
RESOURCE: Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

Combat Today's Threats with A New Approach to Security
sponsored by Fortinet, Inc.
WHITE PAPER: An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Fortinet, Inc.

How To Limit Privileged Accounts And Boost Security
sponsored by Devolutions
EGUIDE: Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
Posted: 20 Mar 2017 | Published: 15 Mar 2017

Devolutions

Understanding the IoT Explosion and Its Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Fortinet, Inc.

Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Encrypt Everything: How to Unshare and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements for data-driven initiatives while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Your Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

What it Takes for Encryption Key Manager to Combat Today's Threats
sponsored by Gemalto
WHITE PAPER: Learn how to manage your existing keys from third-party solutions, while offering you a full portfolio of flexible encryption options that work on-premises, in traditional data centers, and in virtualized public or private-cloud environments.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

How to Start Building an Enterprise Application Security Program
sponsored by tCell
EGUIDE: In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
Posted: 20 Mar 2017 | Published: 16 Mar 2017

tCell
176 - 200 of 650 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement