IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 536 Matches Previous Page  |  Next Page
In Defense of Secure, Compliant Information Sharing
sponsored by Axway
RESOURCE: Find out how the Danish Defence selected the API platform that would best fit their needs, and explore the ins and outs of deploying in a secure DMZ.
Posted: 21 May 2018 | Published: 29 Dec 2017

Axway

NS1 Infrastructure Automation with OctoDNS and Terraform
sponsored by NS1
VIDEO: In this webcast, learn from Devin Bernosky, lead solutions engineer at NS1 about infrastructure automation with DNS and cloud-centric multi-provider configuration tools.
Posted: 20 May 2018 | Premiered: 15 May 2018

NS1

The Data Center Network Security Evolution: What's Next?
sponsored by NSS Labs
WHITE PAPER: Learn about the evolution that's occurring within the data center network security market and what you should look for in order to get the most out of your data center security protections.
Posted: 17 May 2018 | Published: 17 May 2018

NSS Labs

Evolution of Incident Response: Shifting to Full Incident Management in Today's Threat Landscape
sponsored by IBM
WHITE PAPER: In this white paper, Enterprise Management Associates (EMA) provides an outlook for empowering more effective incident response through orchestrated playbooks and automation. Retaining a reactive approach to incident response, opposed to being proactive, could prove a tremendous liability.
Posted: 16 May 2018 | Published: 16 May 2018

IBM

How Inovalon Uses Sophos to Control Security Costs on AWS
sponsored by AWS - Sophos
VIDEO: In this webinar, hear from Bill Prout of Sophos and Frank Scalzo of Inovalon about strengthening their security posture with unified threat management and their reasoning for moving to the cloud.
Posted: 09 May 2018 | Premiered: 04 May 2018

AWS - Sophos

Acrobat DC Security Overview
sponsored by Adobe Systems, Inc.
WHITE PAPER: Explore Adobe's comprehensive approach to security as it relates to Acrobat DC, to help protect your information and experience even further by taking security to a whole new level.
Posted: 09 May 2018 | Published: 30 Jun 2017

Adobe Systems, Inc.

Evolution of Incident Response: Shifting to Full Incident Management in Today's Threat Landscape
sponsored by IBM
WHITE PAPER: In this white paper, Enterprise Management Associates (EMA) provides an outlook for empowering more effective incident response through orchestrated playbooks and automation. Retaining a reactive approach to incident response, opposed to being proactive, could prove a tremendous liability.
Posted: 08 May 2018 | Published: 31 Aug 2017

IBM

LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

How to Deploy a SIEM Solution Successfully
sponsored by LogRhythm, Inc.
ANALYST BRIEF: Inside this Gartner report, discover the key challenges and recommendations and the framework and architecture dimensions that may affect SIEM architecture, with 7 stages of SIEM implementation.
Posted: 27 Apr 2018 | Published: 14 Mar 2018

LogRhythm, Inc.

Dell EMC PowerEdge Servers
sponsored by Dell EMC and Microsoft
RESOURCE: Most organizations do not widely deploy firmware monitoring or protections unless their hardware provider baked them in. Find out why attacks on firmware are becoming a greater threat to systems, and explore the plethora of tools for desktop malware protection and firmware monitoring.
Posted: 27 Apr 2018 | Published: 28 Feb 2018

Dell EMC and Microsoft

How to Secure Complex Cloud Environments and Reduce Costs With Sophos UTM on Amazon Web Services
sponsored by AWS - Sophos
WHITE PAPER: Inside, explore how you can keep your data protected from common threats over HTTP/HTTPS without incurring excessive costs or restricting innovation.
Posted: 25 Apr 2018 | Published: 25 Apr 2018

AWS - Sophos

Integrating, Coordinating, and Orchestrating Enterprise Security Tools
sponsored by Proofpoint, Inc.
VIDEO: Organizations have made significant investments in security technology in the last few years, but these tools are often underutilized due to staff capacity or skills. This webinar explores the security orchestration challenge organizations are facing today.
Posted: 24 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

The Notifiable Data Breach Scheme
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the contents and implications of recent Australia's notifiable data breach (NDB) scheme, and explore some of the key network security challenges posed by its reporting and regulatory burden.
Posted: 23 Apr 2018 | Published: 30 Dec 2016

Fortinet, Inc.

Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

Computer Weekly – 21 November 2017: What can intent-based networking do for you?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

ComputerWeekly.com

Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

ComputerWeekly.com

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Mid-Year Cybersecurity Report 2017
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Cisco Systems, Inc.

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Game Changer: Emergency SaaS Notifications Enabled by the Hybrid Cloud
sponsored by TeraGo Networks
CASE STUDY: In this case study, learn how RMS Software Inc. was able to secure their SaaS-based emergency notification system using hybrid cloud capabilities.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

TeraGo Networks

Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive
sponsored by Oracle Corporation
WHITE PAPER: In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way
Posted: 15 Sep 2017 | Published: 17 Nov 2017

Oracle Corporation

Combining Data Loss Protection with Cloud Access Security Broker Technology
sponsored by Symantec
WHITE PAPER: Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Symantec
1 - 25 of 536 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement