IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed   
Security Architecture Reports
 
Pragmatic Zero Trust
sponsored by Capgemini
RESOURCE: There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’
Posted: 08 Sep 2020 | Published: 23 Jan 2020

Capgemini

Security and IT Ops: Minding the IT Gaps Together
sponsored by Tanium
WHITE PAPER: Contrary to popular belief, security and IT operations have more in common than they think when it comes to business objectives – differences usually arise when it comes to strategic processes. The following white paper highlights those commonalities and explores avenues for collaboration between these two teams.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Tanium

Data Protection Compliance in the UK
sponsored by Zivver
EBOOK: GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Zivver

Thales Data Protection Portfolio
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, discover an overview of Thales’ data protection portfolio – a collection of capabilities and offerings designed to enable improved security, compliance and operational efficiency while reducing costs. Read on to learn more about the features and benefits of the portfolio.
Posted: 11 Sep 2020 | Published: 29 Feb 2020

Thales

Own and Manage Your Encryption Keys
sponsored by Thales
WHITE PAPER: As organizations migrate their data to the cloud, encryption strategies need to be revised to reflect the needs of the changing environment. In this white paper, discover the importance of data encryption, the importance of encryption key ownership, and how all of it affects the security of your company’s cloud-native data.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Thales

How companies in Asia-Pacific are addressing remote workplace security challenges
sponsored by Barracuda
WHITE PAPER: According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Barracuda

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

5 Must-Haves to Look for in a Best-in-Class IoT Security Solution
sponsored by Palo Alto Networks
WHITE PAPER: Based on Gartner’s predictions, adoption of IoT endpoint is estimated to reach 5.81 billion this year. However, in order to integrate IoT responsibly, security considerations need to be made. In this buyer’s guide, discover what to look for in an IoT security solution.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Secure Cloud Computing: Today's Biggest Roadblocks
sponsored by TierPoint MSFT
RESOURCE: Now that the COVID-19 pandemic has pushed most office workers to home-based computers outside of corporate firewalls, there’s more reason for hackers to target the cloud. This article explores today’s biggest cloud security risk areas and how to overcome them – read on to get started.
Posted: 31 Aug 2020 | Published: 19 May 2020

TierPoint MSFT
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info