IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed   
Security Architecture Reports
 
Malware or Maleficent? Take This Quiz to Find Out
sponsored by Cisco Umbrella
WHITE PAPER: Take this quiz to learn about a security platform that uses the internet's infrastructure to block malicious destinations before a connection is ever established.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Single Sign-On with TeamViewer Tensor
sponsored by TeamViewer
RESOURCE: Enterprise remote access can enable your team to work from anywhere on any device, but can also make you more vulnerable to attackers. Learn about a cloud-based remote access management platform that has built-in security features like SSO to help keep you safe from attackers while maximizing productivity in this infographic.
Posted: 30 May 2019 | Published: 30 May 2019

TeamViewer

Tuning Your Log Volume
sponsored by Corelight
WHITE PAPER: In this white paper, learn how filtering can help reduce log volume and make it more manageable and useful—rather than letting it unintentionally fill up disks or drive up SIEM costs.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Corelight

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

CrowdStrike

Automating Software Security Checks for Open Source Software and SDKs
sponsored by Data Theorem
WEBCAST: The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem

Resolving the Agile vs. Secure Application Networking Tradeoff
sponsored by NetFoundry
WHITE PAPER: Read this white paper to learn about a new networking platform designed to enable secure and reliable connect applications without the constraints of VPNs, custom hardware and private circuits.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

NetFoundry

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement