IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed   
Security Architecture Reports
 
Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER: A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018

Akamai Technologies

8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE: Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018

Akamai Technologies

The Rise of the Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: Implementing a secure internet gateway (SIG) can help you monitor and prevent malicious traffic from entering or leaving your organization's network. Download this white paper to learn more about SIGs and the secure features they can bring to your organization.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

Authentication for Your Ever-Changing Needs
sponsored by Micro Focus
WHITE PAPER: In today's connected world, outsider threats are real and—at times—daunting. User credentials for access serve as an essential layer of defense. Learn about Micro Focus Advanced Authentication, which can enable secure interaction with employees, partners, and customers in this white paper.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Micro Focus

How the Rapid Adoption of Public Clouds is Affecting Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Companies are increasingly moving data and applications to public cloud platforms. However, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. In this white paper, learn how public clouds demand particular attention from IT security managers for 3 reasons.
Posted: 28 Feb 2019 | Published: 28 Sep 2018

Fortinet, Inc.

An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

Corelight

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Scaling Network Security
sponsored by Gigamon
ANALYST REPORT: Network speeds continue to increase, putting a strain on security controls that can't scale at the same rate as the networks. Read this research paper to review different network architectures that were designed with security in mind. Also learn about current requirements for today's networks, as well as guidelines for the future.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Gigamon

Zscaler: Use Cases for Gateway Security Stack as a Service
sponsored by Zscaler
CASE STUDY: Download this white paper to learn how you could shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by using a gateway security stack as a service.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

Zscaler

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement