IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
26 - 50 of 523 Matches Previous Page  |  Next Page
Research Report: Security Threats Facing the Public Sector
sponsored by Verizon
RESEARCH CONTENT: Discover the 3 most prevalent security risks facing IT in the public sector, and how you can go about mitigating your vulnerability.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

The Threats Facing Financial Service Institutions in 2016
sponsored by Verizon
RESOURCE: Understand the nature of the security threat facing financial enterprises in 2016. Inside this paper you will find a quick, granular discussion of the sorts of attacks your network will be facing this year, and ways to inoculate your data from harm or theft.
Posted: 06 Jun 2016 | Published: 29 Apr 2016

Verizon

User Behavior Analytics: Track Individual Data and Activities in Your Network
sponsored by Exabeam
EGUIDE: Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.
Posted: 01 Jun 2016 | Published: 24 May 2016

Exabeam

The Hunt for Data Analytics: Is Your SIEM on the Endangered List?
sponsored by Exabeam
EGUIDE: Some companies are pursuing data analytics as a complete security strategy, but many more are taking a hybrid approach. Learn how you can – and why you should – add more data analysis to your SIEM tools in order to reinforce your security defenses.
Posted: 31 May 2016 | Published: 20 May 2016

Exabeam

Micro-Segmentation: A Demonstration
sponsored by Unisys
VIDEO: This video illustrates how to micro-segment a network. Discover ways micro-segmentation cryptographically isolates your valuables down to the smallest levels, and organizes them into functional communities so that only the right people can do the right things.
Posted: 26 May 2016 | Premiered: 09 Nov 2015

Unisys

Communications Security: Key Issues and How to Succeed
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Review the common unified communications security issues and how you can counteract those issues and help your businesses safeguard IT assets, mitigate financial loss or legal exposure, and maintain high service levels when deploying real-time communications.
Posted: 26 May 2016 | Published: 30 Sep 2015

Oracle Corporation UK Ltd

Identity-Driven Micro-Segmentation Everywhere you Work
sponsored by Unisys
RESOURCE: Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.
Posted: 23 May 2016 | Published: 23 May 2016

Unisys

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: It's time to reevaluate access layer protection in enterprise WLANs and learn why deploying ad-hoc security is no longer enough to protect against threats. In this e-book, you'll read about new access layer defense strategies, and tips on how to select a secure WLAN solution.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

Secure Access for Large Public Venues
sponsored by Fortinet, Inc.
RESOURCE: For large public venues, poor Wi-Fi performance can be very damaging to popularity and success. Learn how these enterprises are overcoming the challenges and deploying secure, reliable Wi-Fi despite hostile environments and a large number of user expectations.
Posted: 19 May 2016 | Published: 04 May 2016

Fortinet, Inc.

SDN Security: Building a Safer Architecture
sponsored by VMware
EGUIDE: As mobile devices and IoT increase the number of network connections, organizations can no longer rely on a hardened network perimeter to prevent cyberattacks. Learn how software-defined networking (SDN) technology enables networks to identify a cyberattack and segment the network to prevent attackers from moving throughout the organization.
Posted: 17 May 2016 | Published: 04 May 2016

VMware

Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER: Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

Flipping the Economics of Attacks
sponsored by Palo Alto Networks
RESEARCH CONTENT: Discover the results of this independent study of over 300 security experts on the topic of building a security plan with the bottom line in mind. You'll discover the most economical way to prevent your enterprise from falling victim to attack.
Posted: 13 May 2016 | Published: 29 Jan 2016

Palo Alto Networks

Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

Secur ing Productivity in the Border less Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

Gartner Magic Quadrant for Endpoint Protection Platforms
sponsored by Intel Security
ANALYST REPORT: This Magic Quadrant report direct from Gartner investigates the quality of endpoint protection platforms, capabilities, the depth of features and the ease of control from current endpoint vendors to help you decide the proper endpoint security platform for your organization (and your budget).
Posted: 12 May 2016 | Published: 01 Feb 2016

Intel Security

Network micro-segmentation brings security to NSX and ACI
sponsored by VMware
EGUIDE: Network micro-segmentation is being incorporated into network virtualization and SDN security strategies. Read on to learn more about network micro-segmentation for security and see how your business can create a zero trust security zone.
Posted: 11 May 2016 | Published: 04 May 2016

VMware

Whiteboard: Barracuda Web Application Firewall
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.
Posted: 10 May 2016 | Premiered: 30 Jun 2015

Barracuda Networks

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they do their damage. Explore 5 things to look for when researching EDR solutions, so you can determine which are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Operationalizing Threat Intelligence
sponsored by Intel Security
PRODUCT OVERVIEW: Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

McAfee Labs Threats Report
sponsored by Intel Security
WHITE PAPER: Access this in-depth report from McAfee Labs to learn more about the rise of cyber threat intelligence—including findings from a recent survey of IT professionals—as well as what you need to know about the increasingly prevalent threat of Adwind Java-based malware.
Posted: 09 May 2016 | Published: 31 Mar 2016

Intel Security

Orchestrating Security in the Cloud
sponsored by Intel Security
WHITE PAPER: The following report takes an in-depth look at the SANS Technology Institute's survey results about cloud computing to reveal where hidden vulnerabilities lie and what must happen to avoid falling prey to attack.
Posted: 06 May 2016 | Published: 30 Sep 2015

Intel Security

The 5 Characteristics of an Intelligence-Driven Security Operations Center
sponsored by Intel Security
WHITE PAPER: Access this report by Gartner to examine the challenges traditional security operations centers face, and how you can build an intelligence-driven one that can handle today's dynamic threat and risk environment.
Posted: 06 May 2016 | Published: 15 Nov 2015

Intel Security

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security
26 - 50 of 523 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement