IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 765 Matches Previous Page  |  Next Page
Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

ComputerWeekly.com

A Scalable Security Data Platform
sponsored by ChaosSearch
WHITE PAPER: Read this white paper to learn how log analytics platforms like ChaosSearch can help you process huge amounts of log data, use this data to identify and act on threats, and deal with advanced security issues like advanced persistent threats.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

ChaosSearch

Boosting Expertise in Clinical Engineering atTRIMEDX
sponsored by CyberVista
CASE STUDY: TRIMEDX, a global leader in clinical asset management in healthcare, needed a cybersecurity training program for a clinical engineering workforce of more than 3,100 team members. Download this case study to learn how their partnership with CyberVista helped them prepare employees for the worst that threat actors have to offer.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

CyberVista

Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access
sponsored by Palo Alto Networks
ANALYST REPORT: As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Palo Alto Networks

How To Stop Firefighting And Make Security Strategic- Long
sponsored by BROADCOM, Inc
RESOURCE: As much as 80% of the world’s mission-critical data resides on mainframes. As such, you must keep yours secure – but an ad-hoc security strategy, deployed by many an enterprise, simply won’t get it done. Download this resource to learn 5 ways to stop day-to-day security battles and construct a real security strategy to secure your mainframe.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

BROADCOM, Inc

The Importance of Security Awareness Training
sponsored by Vipre
EBOOK: The importance of security awareness in today’s climate cannot be understated. But much of the time, leadership will still turn a blind eye to security awareness – they believe that investing in the right technology will do well enough. Browse this e-book to learn the 5 key components to convincing leadership to invest in security awareness.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Vipre

The Business Value of iboss cloud Enterprise Security Solutions
sponsored by iBoss
ANALYST REPORT: Throughout digital transformation efforts, enterprises need to keep a close eye on 4 main control points: Identities, applications, data and endpoints. How can you gain visibility without having to rely on legacy security? Download this IDC report to learn experiences that organizations have had using iboss cloud enterprise security solutions.
Posted: 18 Mar 2021 | Published: 31 Jan 2020

iBoss

The Promise of XDR for Effective Threat Detection and Response
sponsored by Fortinet, Inc.
ANALYST REPORT: In a recent ESG survey, a couple of telling conclusions came to light: Detection and response efforts are stressed to a breaking point, and organizations want consolidated and integrated security operations solutions. Extended detection and response (XDR) may be able to help. Access the full ESG report to learn the specific benefits of XDR.
Posted: 17 Mar 2021 | Published: 31 Dec 2020

Fortinet, Inc.

CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure

Securing Microsoft Office 365 and Other Azure Applications with Ciphertrust Cloud Key Broker for Azure
sponsored by Arrow & Thales
WHITE PAPER: Today’s customers expect easy-to-use services, only paying for what they need. However, while they want more of these services, they either can’t or won’t give up control of their data for security reasons. Check out this white paper to see how the CipherTrust Cloud Key Broker for Azure aims to address this issue through key management.
Posted: 01 Mar 2021 | Published: 31 Aug 2020


Cybereason Video 2 – Live Attack Simulation
sponsored by Cybereason
WEBCAST: Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
Posted: 26 Feb 2021 | Premiered: Feb 26, 2021

Cybereason

Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Turning Knowledge into Power
sponsored by Trend Micro
EBOOK: Organizations are working to defend against the volume of evolving cyberthreats plaguing them every day. One critical way to do so is through reading in-depth research that provides access to the methods and means of cybercriminals. Dive into this e-book learn about the 8 critical areas of cybersecurity and threat research.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE
sponsored by Trend Micro
DATA SHEET: Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

BEST PRACTICES DNS: The First Principle Of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

The Impact of XDR in the Modern SOC
sponsored by Dell SecureWorks
ANALYST REPORT: Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 23 Feb 2021 | Published: 30 Nov 2020

Dell SecureWorks

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Making It Safe for Federal Employees to Work Remotely
sponsored by Forcepoint
EBOOK: The Office of Management and Budget (OMB) released guidance recommending agencies implement ‘maximum’ telework flexibility where possible. While you may have some security in place to accommodate this sudden shift, it’s tough to be fully prepared. Study this e-book to learn tips for securing federal remote workers.
Posted: 22 Feb 2021 | Published: 14 May 2020

Forcepoint

Making It Safe for Federal Employees to Work Remotely
sponsored by Forcepoint
EBOOK: The Office of Management and Budget (OMB) released guidance recommending agencies implement ‘maximum’ telework flexibility where possible. While you may have some security in place to accommodate this sudden shift, it’s tough to be fully prepared. Study this e-book to learn tips for securing federal remote workers.
Posted: 22 Feb 2021 | Published: 14 May 2020

Forcepoint
1 - 25 of 765 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences