IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
76 - 100 of 354 Matches Previous Page  |  Next Page
Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Protecting your Organization’s Most Valuable Data
sponsored by IBM
WEBCAST: This webcast delves into how to find out the source of database information attacks. Watch now to explore multiple case studies of security breaches and how one data protection platform simplifies detecting and blocking rogue users.
Posted: 11 Mar 2015 | Premiered: Jan 15, 2015

IBM

Research shows IT departments are ready for new approach to cloud security
sponsored by Alert Logic
WHITE PAPER: In this white paper, learn how cloud-based SIEM has risen to prominence and why organizations are looking towards it as the new and comprehensive security service.
Posted: 10 Mar 2015 | Published: 13 Nov 2014

Alert Logic

The 5 Challenges of Data Security
sponsored by IBM
WHITE PAPER: In this white paper, learn the five challenges regarding data security today. Additionally, read on to uncover the five steps to strengthening your data security strategy.
Posted: 09 Mar 2015 | Published: 10 Sep 2014

IBM

5 Threats Google Apps Can't Defend
sponsored by Datto, Inc.
WHITE PAPER: In this white paper, learn the five threats that Google can't defend and how to protect your data on your own. Read on now to learn more.
Posted: 06 Mar 2015 | Published: 04 Feb 2015

Datto, Inc.

Cyber Security Roadmap
sponsored by ESET
WHITE PAPER: This white paper presents a clear, easy-to-follow roadmap to creating comprehensive security on a modest budget.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

ESET

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

The Value in Threat Intelligence Information
sponsored by Webroot
EGUIDE: This expert guide describes the pros and cons of threat intelligence and helps you decide if it's right for your company.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Webroot

Integrated Mobile Access Control Has Become a Top Priority
sponsored by Axway
WHITE PAPER: Find out how one particular financial institution used an application programming interface (API) to simplify its security architecture, while saving software license, software maintenance, hardware and administration costs.
Posted: 25 Feb 2015 | Published: 31 Dec 2013

Axway

Back to Basics: Securing Business Information on the Cloud
sponsored by Box
WHITE PAPER: View this white paper to learn how the cloud can enable us to go back to security basics to manage distributed computing.
Posted: 25 Feb 2015 | Published: 04 Feb 2015

Box

An Alternative to Today's Distributed Content Security Chaos
sponsored by Box
WHITE PAPER: View this resource to learn how cloud-based services can provide superior security compared to traditional built-out methods.
Posted: 25 Feb 2015 | Published: 05 Mar 2014

Box

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what those precautions are and how to take them when dealing with the cloud.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Rackspace

Next Generation Firewalls: What Can They Do for You?
sponsored by Cisco
EGUIDE: In this expert guide you can find tips on assessing your security needs and deciding if a next generation firewall is a smart choice for you.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Cisco

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

New Threats to Healthcare and How to Stop them
sponsored by NaviSite
WEBCAST: This webcast provides you with a detailed analysis of healthcare's security threats and suggestions for combatting them.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

NaviSite

Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

Magic Quadrant for Network Access Control
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

A Guide to Cyber Security that Fights the Worst Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Survey Shows Need for Security Improvement
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company
76 - 100 of 354 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement