IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
51 - 75 of 354 Matches Previous Page  |  Next Page
Top 3 DNS Monitoring Methods
sponsored by Cloudmark
EGUIDE: This expert e-guide walks you through the top three DNS monitoring methods. Additionally, read on to uncover how defense tactics are revealed through DNS attacks.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Cloudmark

Tackle IAM with a Risk-Based Approach
sponsored by Gemalto
EGUIDE: This expert e-guide takes a look at using a risk-based approach to overcoming the hurdles posed by IAM and the shortcomings of traditional and outdated strategies.
Posted: 26 Mar 2015 | Published: 04 Feb 2015

Gemalto

IAM: The New Security Perimeter
sponsored by IBM
WHITE PAPER: Access this white paper to explore how IAM platforms reduce risk and keep unknown users and hackers out of your network.
Posted: 25 Mar 2015 | Published: 05 Nov 2013

IBM

The Growing Need for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Access this white paper to reveal why you need FSSO in your IAM strategy to mitigate risk and vulnerabilities. View now to explore the buyer's guide checklist for choosing the ideal FSSO platform and the benefits to expect.
Posted: 25 Mar 2015 | Published: 05 Mar 2014

IBM

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

Alternative Strategies to Mobile Device Security
sponsored by Maas360 by IBM
WEBCAST: This webcast offers an alternative to managing an entire mobile device and keeps enterprise data inside an encrypted container.
Posted: 24 Mar 2015 | Premiered: Jan 21, 2015

Maas360 by IBM

5 Important Truths about Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper, explore the five truths that offer answers to those critical questions. Read on to learn how to protect your users and enterprise in the digital workspace age.
Posted: 24 Mar 2015 | Published: 14 Jan 2015

RES Software

Everbridge Case Study: Optimizing Network Security Management
sponsored by F5 Networks
WHITE PAPER: Read more to learn how you can boost your network security and efficiency while also cutting costs.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

F5 Networks

Deploying a Next-Generation IPS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper explains how deploying an IPS behind and application delivery controller (ADC) can optimize IPS performance, simplify IPS management, increase business agility, and improve overall network security. Read more to learn how you can boost your network security and efficiency with one simple solution.
Posted: 23 Mar 2015 | Published: 19 Dec 2014

F5 Networks

A Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Download this paper to discover the pros and cons of an SIEM platform and to determine if this is the one that meets your needs.
Posted: 23 Mar 2015 | Published: 30 Sep 2014

IBM

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Find the Anomalies in Your Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Cloud security: You don't need to go it alone
sponsored by Alert Logic
WEBCAST: In this webcast, discover an alternative to adding on SIEM resources or solutions and how to defend against multiplying attacks.
Posted: 18 Mar 2015 | Premiered: Nov 10, 2014

Alert Logic

How to Improve Your Threat Intelligence
sponsored by Threatstream
WHITE PAPER: This white paper discusses those problems and how threat intelligence is evolving to fix them.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Threatstream

Purpose built solution addresses security and compliance concerns
sponsored by Alert Logic
WEBCAST: Access this webcast to learn how one cloud-based security strategy can protect your sensitive data against today's dynamic cyber-attacks. Watch now to learn more.
Posted: 17 Mar 2015 | Premiered: Jan 14, 2015

Alert Logic

Unified Communications Security Measures: Ensuring Peace of Mind
sponsored by ThinkingPhones
WHITE PAPER: This white paper discusses the essential security features all unified communications should have.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

Breach Detection: 6 quick tips to strengthen your response plan
sponsored by Alert Logic
WHITE PAPER: This guide tells you the 6 essential steps needed for successful incident response.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

ROI Analysis: How to reduce security risks and labor related costs
sponsored by Alert Logic
WHITE PAPER: This economic impact report analyzes one effective risk management solution to give you an accurate assessment of that product's ROI.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Log Management Fundamentals
sponsored by Alert Logic
WHITE PAPER: This brief guide gives you a quick and clear outline of the fundamentals of log management and the log collection sources you need to have.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

Data Security and Privacy: Building Confidence in Big Data
sponsored by IBM
WHITE PAPER: In order to protect big data, you need to first understand big data. This white paper will help you do so.
Posted: 16 Mar 2015 | Published: 31 Oct 2012

IBM

4 Steps to Address Vulnerabilities Before a Breach
sponsored by IBM
WHITE PAPER: This white paper addresses how vulnerabilities can go undetected and gives you advice for mitigating these vulnerabilities.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

IBM

Apple Native Security
sponsored by JAMF Software
WHITE PAPER: Read on to learn how the native Apple security frameworks can keep your mobile information safe and your employees happy.
Posted: 16 Mar 2015 | Published: 27 Feb 2015

JAMF Software
51 - 75 of 354 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement