IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
76 - 100 of 505 Matches Previous Page  |  Next Page
Architecture Matters: Beyond Layered Security Approaches
sponsored by Palo Alto Networks
WHITE PAPER: The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Palo Alto Networks

Secure Enterprise Email on Mobile Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

BYOD Mobile Device Management
sponsored by IBM MaaS360
WHITE PAPER: Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM MaaS360

BYOD Cross-Platform Security: Protecting Enterprise Data
sponsored by IBM MaaS360
WHITE PAPER: In era of BYOD, enterprises are faced with the challenge of sensitive data leakage. Uncover the key benefits every solution needs to consider, such as reducing the risk of sensitive data leakage, use of single sign-on for authentication, enable online and offline compliance, and more.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

IBM MaaS360

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

Top 10 Cyber Incident Pain Points: Are You Prepared?
sponsored by Delta Risk
WHITE PAPER: Discover the 10 most prevalent factors that lead to a network being especially prone to cyber incidents. Interestingly, these characteristics are common across industries.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Delta Risk

A Security Delivery Platform Benefits the Entire Organization
sponsored by Gigamon
WHITE PAPER: As the cybersecurity threat landscape continues to evolve, organizations need to start taking into account current and future cybersecurity trends. Examine a solution that provides the network visibility you need to improve protection.
Posted: 09 Jun 2016 | Published: 09 Jun 2016

Gigamon

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

User Behavior Analytics: Track Individual Data and Activities in Your Network
sponsored by Exabeam
EGUIDE: Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.
Posted: 01 Jun 2016 | Published: 24 May 2016

Exabeam

The Hunt for Data Analytics: Is Your SIEM on the Endangered List?
sponsored by Exabeam
EGUIDE: Some companies are pursuing data analytics as a complete security strategy, but many more are taking a hybrid approach. Learn how you can – and why you should – add more data analysis to your SIEM tools in order to reinforce your security defenses.
Posted: 31 May 2016 | Published: 20 May 2016

Exabeam

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: It's time to reevaluate access layer protection in enterprise WLANs and learn why deploying ad-hoc security is no longer enough to protect against threats. In this e-book, you'll read about new access layer defense strategies, and tips on how to select a secure WLAN solution.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

Secure Access for Large Public Venues
sponsored by Fortinet, Inc.
RESOURCE: For large public venues, poor Wi-Fi performance can be very damaging to popularity and success. Learn how these enterprises are overcoming the challenges and deploying secure, reliable Wi-Fi despite hostile environments and a large number of user expectations.
Posted: 19 May 2016 | Published: 04 May 2016

Fortinet, Inc.

SDN Security: Building a Safer Architecture
sponsored by VMware
EGUIDE: As mobile devices and IoT increase the number of network connections, organizations can no longer rely on a hardened network perimeter to prevent cyberattacks. Learn how software-defined networking (SDN) technology enables networks to identify a cyberattack and segment the network to prevent attackers from moving throughout the organization.
Posted: 17 May 2016 | Published: 04 May 2016

VMware

Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

Securing Productivity in the Borderless Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

Whiteboard: Barracuda Web Application Firewall
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.
Posted: 10 May 2016 | Premiered: 30 Jun 2015

Barracuda Networks

The Adaptive Security Platform: Secure the Modern Data Center
sponsored by Illumio
EGUIDE: In this e-guide, uncover an interview with two security gurus from Illumio, a winner of our Network Innovation Award, on their Adaptive Security Platform (ASP). Learn the basics about this platform, and gain insights on how you can reduce complexity and develop a discerning data center security posture.
Posted: 21 Jun 2016 | Published: 15 Jun 2016

Illumio

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

IBM Security QRadar Incident Forensics
sponsored by IBM
WHITE PAPER: Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2014

IBM

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Operationalizing Threat Intelligence
sponsored by Intel Security
PRODUCT OVERVIEW: Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security
76 - 100 of 505 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement