IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed   
Security Architecture Reports
 
Keeping Users Safe from Advanced Threats and Unsolicited Content
sponsored by Barracuda Networks
PRODUCT OVERVIEW: How can you stop advanced malware from breaching your network perimeter and stealing your valuable data? The following paper explains how to confront—and thwart—these threats using a cloud-based firewall that combines multiple layers of detection for all threat vectors with on-the-fly sandbox execution of unknown files.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Understanding and Preventing Finance Phishing Fraud
sponsored by Barracuda
WEBCAST: Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.
Posted: 24 May 2019 | Premiered: May 24, 2019

Barracuda

Computer Weekly – 7 August 2018: How digital is driving golf to the connected course
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how one of the most traditional of sports, golf, is turning to technology to engage a new audience and build the connected course. Industry legend Stephanie 'Steve' Shirley discusses skills, diversity in tech and Brexit fears. And we assess four of the biggest cloud storage providers. Read the issue now.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

ComputerWeekly.com

Securing Your Business Amid Cloud Migration
sponsored by British Telecommunications PLC
RESOURCE: Learn about a new way to tackle cybercriminals in this resource, and find out how you can stay protected when completing your move to the cloud.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

British Telecommunications PLC

Securing Office 365 Against Data Loss and Advanced Threats
sponsored by Datto, Inc.
WEBCAST: Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.
Posted: 15 Oct 2019 | Premiered: Oct 15, 2019

Datto, Inc.

Drive Security Intelligence With Splunk
sponsored by Splunk
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement