IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 600 Matches Previous Page  |  Next Page
State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft

Document and Endpoint Security: Checklists and Discussion Guides
sponsored by Xeretec
WHITE PAPER: Download this white paper to review tips on protecting business documents and securing the multifunction printers and devices that create them.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Xeretec

6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Download this white paper to learn about a dynamic threat blocking (DTB) tool that is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack, dynamically.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Armor

How 1 University Keeps Their Petabytes of Data Safe
sponsored by Atempo, Inc.
CASE STUDY: Download this case study to learn more about how University of Lausanne was able to secure its several petabytes of data stored in 3 data centers.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Atempo, Inc.

Analytics-drive Security: The Next Frontier for CSOs
sponsored by Splunk
RESOURCE: In this resource, learn about an analytics-driven security technology that is designed to connect the dots faster to help predict patters, identify suspicious behavior, and automate corrective actions
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Splunk

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Why Dwell Time Should Be Considered a Critical Security Success Metric
sponsored by Armor
WHITE PAPER: In this white paper, learn why operations centered on Dwell Time - in their architectures, policies and processes - have an opportunity to make meaningful enhancements to their security strategy and maximize the investments made in their current security programs.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Armor

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Enterprise-Class Security for Robotic Process Automation
sponsored by Automation Anywhere
WHITE PAPER: Robotic process automation (RPA) has the potential to empower business users to create software bots that can interact with enterprise systems as if they were humans. Download this report for an overview of top options that will help you use RPA to its fullest.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

Automation Anywhere

Protect Hybrid Workloads from Cyberattack: Advance to Secure Servers
sponsored by Logicalis
WHITE PAPER: Download this white paper to learn about an approach to protecting hybrid workloads from cyberattacks that utilizes a server specifically designed to protect against malicious threats that target firmware.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Logicalis

Is Your Growing Business Properly Securing Its Data?
sponsored by Evident
WHITE PAPER: Download this resource to learn the 3 steps you can take to implement a scalable security structure, and embrace flexible data management and verification processes to avoid a costly data breach as your business grows.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Evident

Critical Considerations for Choosing a Cloud Security Provider
sponsored by IBM Akamai
WHITE PAPER: Download this white paper to learn how you can augment your existing on-premises infrastructure with security measures in the cloud for a more robust web security posture, and explore 7 critical factors you should look for in a cloud security provider.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

IBM Akamai

Top 10 Cloud Security Challenges
sponsored by Rackspace
WHITE PAPER: Cloud security is at the forefront of business agendas. Evolving security threats, new hacker methodologies, skills shortages and more are top-of-mind issues for CIOs. Download this resource today to discover 10 common concerns felt by CIOs and how you can approach and neutralize each.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Rackspace

Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
RESOURCE: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Splunk

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

Gain Security Visibility and Strengthen HIPAA Compliance with the AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Download this case study to learn why Bethesda Health Group chose to implement Arctic Wolf's AWN CyberSOC to protect their network, while helping them reach their HIPAA compliance goals and prevent cyberattacks.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Arctic Wolf

Webinar: Impact of Your Business Continuity Program on Cyber Resiliency
sponsored by IBM
WEBCAST: In this webinar, APAC Leader at IBM Mijee Briana Walker stresses the importance of establishing a business continuity management (BCM) program that proactively provides uptime in case of data breaches. Tune in for a proven, 3-pronged framework for BC, 10 areas your BCM should focus on, and more.
Posted: 09 Nov 2018 | Premiered: Nov 9, 2018

IBM

ESG – Enabling Cybersecurity in the Age of Digital Transformation
sponsored by VMware
ANALYST REPORT: Read this white paper to explore the impact of digital transformation on cybersecurity processes and technologies and the architecture for securing the foundational aspects of modern, enterprise IT.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

VMware

Transforming Security in the Mobile Cloud Era
sponsored by VMware
WHITE PAPER: Read this eBook to explore insights that can help you re-evaluate how your IT department approaches security in the mobile cloud era.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

VMware

The Growing Importance of Device Identity Management in IT Security Strategies
sponsored by BeCrypt
RESOURCE CENTER: Download this joint ComputerWeekly report for an overview of the growing importance of device identity management in IT security strategies, and tips for creating a successful strategy.
Posted: 29 Oct 2018 | Published: 29 Oct 2018

BeCrypt

VxRail Cybersecurity Solutions Overview
sponsored by Dell EMC and VMware
PRODUCT OVERVIEW: Access this sheet for an overview of a resilient hyper-converged infrastructure option ideal for keeping virtualization environments secure. The system includes extensive levels of encryption to protect the confidentiality of data in use, in motion, and at rest; safeguard the entire data store, and protect VMs.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Dell EMC and VMware

Mapping the Requirements of Next-Generation Sandboxing
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 7 key capabilities to look for in a next-gen sandboxing platform so that you can build a security architecture that's designed to detect and prevent threats before they can impact your network or your business as a whole.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.
1 - 25 of 600 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement