IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
26 - 50 of 469 Matches Previous Page  |  Next Page
How to Federate Access and Identity Together for a Complete IdP
sponsored by Radiant Logic, Inc.
WEBCAST: Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.
Posted: 31 Mar 2016 | Premiered: Feb 12, 2016

Radiant Logic, Inc.

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

4 Ways Hackers Break into Your Network – And How to Stop Them
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Despite heavy investments, networks are still seeing successful attacks. Access this white paper to learn about four fatal failures of network security and the actions you can take to fortify your defenses.
Posted: 29 Mar 2016 | Published: 27 Jan 2016

ForeScout Technologies, Inc.

Q4 Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

MobileIron

Case Study: State of Missouri Uncovers Hidden Network Devices
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study details how the State of Missouri shined a light on their network access and traffic to uncover how many devices, secure and vulnerable, were on at any given time.
Posted: 25 Mar 2016 | Published: 27 Jan 2016

ForeScout Technologies, Inc.

Case Study: Reveal Malicious Endpoints on Your Network
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study reviews how Sutton and East Surrey Water, an organization that supplies drinking water to approximately 670,000 residents, faced non-compliance and network threats and the steps they took to reveal what devices accessed their network.
Posted: 24 Mar 2016 | Published: 25 Nov 2015

ForeScout Technologies, Inc.

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

4 Steps to Developing a Proactive Security Program
sponsored by Dell SecureWorks
WHITE PAPER: The harsh truth of security today is reactive strategies are outdated and it's time to switch gears to a proactive defense. This paper outlines the discrete layers and levels needed for a proactive security strategy. Inside, learn how to shift from a reactive to a proactive defense in 4 simple steps.
Posted: 24 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Charting a New Course for IT Security with Coordinated Threat Defenses
sponsored by TrendMicro
WHITE PAPER: Access this white paper and find out how you can achieve fewer compromises, substantially shorter dwell times for threats that do manage to get through, and far less effort and expense required for incident response and to operate and maintain your security infrastructure.
Posted: 23 Mar 2016 | Published: 24 Feb 2016

TrendMicro

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.

Architecting for Security Resilience
sponsored by Ixia
WHITE PAPER: Network architects understand that resilience starts at the foundation. Review the several strategies to create an inline security architecture and find out which is best for your organizations.
Posted: 22 Mar 2016 | Published: 25 Nov 2015

Ixia

100% Network Visibility is Easier than You Think
sponsored by Ixia
RESOURCE: This brief infographic presents the capabilities that you need to look for in NPBs and how to achieve 100% visibility into your network traffic. Uncover the negative effects of packet loss and how to avoid them.
Posted: 22 Mar 2016 | Published: 27 Jan 2016

Ixia

CISO's Guide to the Top 7 IoT Risks
sponsored by ForeScout Technologies, Inc.
EGUIDE: As more devices connect to the internet, hackers raise their chances of successfully breaking into an organization. This e-guide gives CISOs defensive strategies to mitigate IoT driven attacks.
Posted: 21 Mar 2016 | Published: 09 Mar 2016

ForeScout Technologies, Inc.

Overcoming Virtual Blind Spots
sponsored by Ixia
WHITE PAPER: Visibility into your network is the only chance you have at mitigating advanced and hidden threats.To overcome east-west traffic blind spots, network security strategies must include virtual tapping into the production virtual network.
Posted: 21 Mar 2016 | Published: 24 Feb 2016

Ixia

Study Shows New Generation of IT Security Threats
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

The New Network Security Front Line
sponsored by Ixia
WEBCAST: In this brief video, learn how to decrease your network's attack surface to minimize the number of threats that can potentially breach your defenses.
Posted: 18 Mar 2016 | Premiered: Jan 6, 2016

Ixia

Forget Network Defense - Focus on Offense
sponsored by Ixia
WHITE PAPER: This white paper explains why your network security strategy needs to include testing and training to make sure a product or service is protected before launch. Read on to learn more about an offensive security strategy and what it needs to contain.
Posted: 18 Mar 2016 | Published: 02 Mar 2016

Ixia

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Manufacturing: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper offers a high-level overview of major threats trending across businesses worldwide over the past year. View now for insight into the current threat landscape for the manufacturing industry and offers solutions that can help you better protect your organization.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

IBM

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

Experts Weigh in on Network Segmentation Best Practices
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Experts weigh in on the improved security and simplified administration microsegmentation promises in this e-guide. It appears to be the next logical step to securing your data, but will it deliver once the hype dies down?
Posted: 14 Mar 2016 | Published: 29 Feb 2016

NTT Com Security (UK) Ltd

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Top 5 Benefits of a Security Operations Center
sponsored by IBM
WHITE PAPER: This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.
Posted: 14 Mar 2016 | Published: 31 Dec 2013

IBM
26 - 50 of 469 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement