IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed   
Security Architecture Reports
 
Randori Recon How To Prioritize Like An Attacker
sponsored by Randori
EBOOK: With the rise of cloud computing, containerization, and serverless computing, maintaining a perfect inventory of your external assets and ensuring they are patched has become an overwhelming challenge. Read this e-book to discover Randori’s best practices for analyzing your attack surface in the most effective way.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

Improving Security and Compliance in Hybrid Cloud with Automation
sponsored by Red Hat
WEBCAST: Massive global shifts towards hybrid cloud environments are making cybersecurity more difficult to achieve than ever before. This Red Hat webinar offers exclusive insight into how automation can improve security and compliance in hybrid cloud environments – watch now to get started.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *
sponsored by Bitdefender
RESEARCH CONTENT: Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Posted: 16 Feb 2021 | Published: 30 Nov 2020

Bitdefender

SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY: As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Solution Brief: Malwarebytes Endpoint Detection and Response
sponsored by Malwarebytes
DATA SHEET: Endpoints have never been under greater threat: Attacks have doubled, false positives are skyrocketing and the complexity of EDR solutions is putting a strain on endpoint security. You can combat these issues with endpoint security that’s integrated, proactive and continuous. Check out this white paper to examine easy, effective, efficient EDR.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

The Business Value of iboss cloud Enterprise Security Solutions
sponsored by iBoss
ANALYST REPORT: Throughout digital transformation efforts, enterprises need to keep a close eye on 4 main control points: Identities, applications, data and endpoints. How can you gain visibility without having to rely on legacy security? Download this IDC report to learn experiences that organizations have had using iboss cloud enterprise security solutions.
Posted: 18 Mar 2021 | Published: 31 Jan 2020

iBoss

Vitens Moves To Cloud Security With Bloxone™ Threat Defense From Infoblox
sponsored by Infoblox
CASE STUDY: Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences