IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
51 - 75 of 500 Matches Previous Page  |  Next Page
Hidden Network Devices: How State of Missouri Uncovered and Stopped Threats
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study details how the State of Missouri shined a light on their network access and traffic to uncover how many devices – secure and vulnerable – were on at any given time. Inside learn how you too can improve visibility and control of endpoints, accelerate threat response and mitigate non-compliant device access risks.
Posted: 25 Mar 2016 | Published: 27 Jan 2016

ForeScout Technologies, Inc.

Case Study: Reveal Malicious Endpoints on Your Network
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study reviews how Sutton and East Surrey Water, an organization that supplies drinking water to approximately 670,000 residents, faced non-compliance and network threats and the steps they took to reveal what devices accessed their network.
Posted: 24 Mar 2016 | Published: 25 Nov 2015

ForeScout Technologies, Inc.

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

4 Steps to Developing a Proactive Security Program
sponsored by Dell SecureWorks
WHITE PAPER: The harsh truth of security today is reactive strategies are outdated and it's time to switch gears to a proactive defense. This paper outlines the discrete layers and levels needed for a proactive security strategy. Inside, learn how to shift from a reactive to a proactive defense in 4 simple steps.
Posted: 24 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Charting a New Course for IT Security with Coordinated Threat Defenses
sponsored by TrendMicro
WHITE PAPER: 76% of surveyed security professionals indicated their organization had been compromised by at least one successful cyberattack in 2015. Don't let your enterprise be the next one. Discover applicable options, trade-offs, and other considerations to migrate your security defenses.
Posted: 23 Mar 2016 | Published: 24 Feb 2016

TrendMicro

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.

Architecting for Security Resilience
sponsored by Ixia
WHITE PAPER: As a network architect, you understand that resilience starts at the foundation. Review the several strategies to create an inline security architecture and find out which is best for your organization.
Posted: 22 Mar 2016 | Published: 25 Nov 2015

Ixia

100% Network Visibility is Easier than You Think
sponsored by Ixia
RESOURCE: This brief infographic presents the capabilities that you need to look for in NPBs and how to achieve 100% visibility into your network traffic. Access now and uncover the negative effects of packet loss and how to avoid them.
Posted: 22 Mar 2016 | Published: 27 Jan 2016

Ixia

CISO's Guide to the Top 7 IoT Risks
sponsored by ForeScout Technologies, Inc.
EGUIDE: As more devices connect to the internet, hackers raise their chances of successfully breaking into an organization. This e-guide gives CISOs defensive strategies to mitigate IoT driven attacks.
Posted: 21 Mar 2016 | Published: 09 Mar 2016

ForeScout Technologies, Inc.

Overcoming Virtual Blind Spots
sponsored by Ixia
WHITE PAPER: Visibility into your network is the only chance you have at mitigating advanced and hidden threats. To overcome east-west traffic blind spots, network security strategies must include virtual tapping into the production virtual network.
Posted: 21 Mar 2016 | Published: 24 Feb 2016

Ixia

Study Shows New Generation of IT Security Threats
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

The New Network Security Front Line
sponsored by Ixia
WEBCAST: Learn how to decrease your network's attack surface to minimize the number of threats that can potentially breach your defenses. View now and discover how to block confirmed bad IPs with no false positives, block internal botnet, phishing, and other malicious communications from getting out, and more.
Posted: 18 Mar 2016 | Premiered: Jan 6, 2016

Ixia

Forget Network Defense - Focus on Offense
sponsored by Ixia
WHITE PAPER: This white paper explains why your network security strategy needs to include testing and training to make sure a product or service is protected before launch. Read on to learn more about an offensive security strategy and what it needs to contain.
Posted: 18 Mar 2016 | Published: 02 Mar 2016

Ixia

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Manufacturing: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper offers a high-level overview of major threats trending across businesses worldwide over the past year. View now for insight into the current threat landscape for the manufacturing industry and offers solutions that can help you better protect your organization.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

IBM

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

Experts Weigh in on Network Segmentation Best Practices
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Experts weigh in on the improved security and simplified administration microsegmentation promises in this e-guide. It appears to be the next logical step to securing your data, but will it deliver once the hype dies down?
Posted: 14 Mar 2016 | Published: 29 Feb 2016

NTT Com Security (UK) Ltd

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER: This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016

Imperva

Remote Data Management a Necessity at Law Firms
sponsored by Absolute
WHITE PAPER: This white paper provides solutions to ensure data security and privacy. Add persistent endpoint security and data risk management solutions to your IT environment to lock up confidential client information and use your security prowess as a standout advantage in your field.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

Absolute

Understanding and Mitigating DDoS
sponsored by Dyn
WHITE PAPER: DoS/DDoS attacks aren't going anywhere and they're only getting harder to detect and remedy. You need a highly resilient DNS infrastructure to mitigate today's sophisticated attacks.This white paper reviews DNS Denial of Service attack concepts and mitigation strategies.
Posted: 11 Mar 2016 | Published: 24 Feb 2016

Dyn

Guaranteed Business Continuity Thanks to Email Security Gateways
sponsored by LogicNow
RESOURCE: With business continuity on the line, protecting your email, network, and users is imperative. Are secure email gateways (ESGs) the only way to do so? This infographic reviews the many threats IT faces regarding IT security; take a look at how ESGs may prove themselves worthy.
Posted: 10 Mar 2016 | Published: 03 Feb 2016

LogicNow

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Top 5 Benefits of a Security Operations Center
sponsored by IBM
WHITE PAPER: This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.
Posted: 14 Mar 2016 | Published: 31 Dec 2013

IBM
51 - 75 of 500 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement