IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 586 Matches Previous Page  |  Next Page
Top 10 Cloud Security Challenges
sponsored by Rackspace
WHITE PAPER: Cloud security is making its way to the forefront of business agendas. These concerns range from evolving security threats, to skills shortages, to new hacker methodologies. Download this resource today to discover 10 common concerns for It and security professionals and how you can approach and neutralize each.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Rackspace

Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
RESOURCE: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up when evaluating platform options.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Splunk

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

Mapping the Requirements of Next-Generation Sandboxing
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 7 key capabilities to look for in a next-gen sandboxing platform so that you can build a security architecture that's designed to detect and prevent threats before they can impact your network or your business as a whole.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

Gain Security Visibility and Strengthen HIPAA Compliance with the AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Download this case study to learn why Bethesda Health Group chose to implement Arctic Wolf's AWN CyberSOC to protect their network, while helping them reach their HIPAA compliance goals and prevent cyberattacks.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Arctic Wolf

Cloud Security: Combat Threats to Your SaaS-Powered Business
sponsored by Arctic Wolf
WHITE PAPER: In today's rapidly evolving threat landscape, businesses require cybersecurity strategies that leverage capabilities delivered by a world-class SOC. Download this white paper to learn how you can establish a comprehensive security strategy for maximum protection.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Arctic Wolf

Security Automation and Orchestration (SAO) Capabilities
sponsored by Swimlane
WHITE PAPER: Security Automation and Orchestration (SAO) platforms help security teams manage a growing volume of alerts and incidents more efficiently by automating manual response workflows. Download this white paper to learn about SAO platforms, and explore common features and capabilities.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Swimlane

IoT Attack Handbook
sponsored by Radware
WHITE PAPER: Download this IoT Attack Handbook to learn about each Mirai attack vector, understand the profile and parameters of the attacks and explore how to defend against each of the attacks.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

Determining if You've Outgrown Your First-Gen Sandbox
sponsored by Fortinet, Inc.
WHITE PAPER: It's critical to ensure you have a sandbox that can keep up with the increased volume and sophistication of new threats. Read this whitepaper to learn how to choose an effective and efficient sandbox solution.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Fortinet, Inc.

The NOC and SOC Divide Increases Risk While Breeding Inefficiencies
sponsored by Fortinet, Inc.
WHITE PAPER: Download this white paper to learn about breaking down siloes between your NOC and SOC, and how doing so can help you decrease risks and inefficiencies.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Fortinet, Inc.

The Hunt for IoT: The Rise of Thingbots in Europe
sponsored by F5 Networks
WHITE PAPER: More attackers are using IoT devices to build malicious bots. Often times, IoT devices are easy to access and exploit due to open Telnet ports and manufacturers' lax security controls. Download this Threat Analysis Report on IoT devices to learn about these newly developed cyberweapons.
Posted: 21 Sep 2018 | Published: 31 Jul 2017

F5 Networks

How to Secure Your Content in the Cloud with Box
sponsored by Box
WHITE PAPER: Having a content management suite is vital for worker mobility and collaboration across the enterprise. But how do you keep it secure? Download this eBook for an overview of how Box secures content and achieves compliance based on 4 main tenets.
Posted: 19 Sep 2018 | Published: 19 Sep 2018

Box

Cloud Security Foundations
sponsored by Forcepoint
VIDEO: In this webinar, ESG Senior Analyst Doug Cahill will discuss cloud trends and how deploying enterprise-class data loss prevention and cloud access security brokers solutions together can provide key value for your business.
Posted: 17 Sep 2018 | Premiered: 06 Sep 2018

Forcepoint

Bringing Security Architecture Into the Light – the Inherent Value of Transparency and Diagnostics
sponsored by Empow Cyber Security
RESOURCE: Many CISOs deal with the daily frustration of uncertainty with the performance of their security products in their organization's arsenal. Find out how empow's new Security Diagnostics Service can shed the light on your organization's security and help eliminate this daily issue.
Posted: 14 Sep 2018 | Published: 24 Apr 2017

Empow Cyber Security

Supplement Your Security Teams with a Managed SOC
sponsored by Oracle Dyn
RESOURCE CENTER: More IT and security leaders are leveraging a managed security operations center (SOC) as a critical line of defense in protecting their organization's assets, data, operations, and reputation. Download this custom article to explore the top 5 reasons to consider a managed SOC and what to look for in a provider.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Oracle Dyn

Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
sponsored by Arctic Wolf
WEBCAST: Watch this upcoming webinar to learn the essential components needed to defend your business against the top 5 attack vectors we see in a Cyber Security Operations Center (SOC).
Posted: 12 Sep 2018 | Premiered: Sep 12, 2018

Arctic Wolf

Malware or Maleficent? Take This Quiz to Find Out
sponsored by Cisco Umbrella
WHITE PAPER: Take this quiz to learn about a security platform that uses the internet's infrastructure to block malicious destinations before a connection is ever established.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Find out if ransomware poses a big threat to you
sponsored by Cisco Umbrella
EBOOK: Ransomware is one of the most pressing threats in today's business world, and successful attacks can cost organizations hundreds of thousands of dollars. Take this quiz to learn more about ransomware threats and find out if your organization is at high risk.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

9 Metadata Network Security Use Cases
sponsored by Gigamon
WHITE PAPER: With some organizations running more than 2,000 unique applications and tools—which create terabytes of log data—finding anomalies can be difficult. Download this white paper to learn how Gigamon's security platform uses metadata from these applications to protect your organization, and explore use cases for metadata in security.
Posted: 05 Sep 2018 | Published: 31 Dec 2016

Gigamon

The Cloud Security Journey for the University of Oklahoma
sponsored by Cisco Umbrella
WEBCAST: Watch this webcast to learn why University of Oklahoma chose Cisco Cloudlock and Umbrella to protect their highly sensitive and heavily regulated data in the cloud and on prem.
Posted: 04 Sep 2018 | Premiered: Mar 31, 2018

Cisco Umbrella

Rethinking Security Efficacy: How to Reduce and Manage Your Business Risk
sponsored by Citrix
WHITE PAPER: IT and security leaders are encountering ever-increasing levels of risk and exposure to breaches. Download this white paper to learn how to manage your security in the ever-changing digital environment and respond effectively to threats.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

The Rise of the Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: Implementing a secure internet gateway (SIG) can help you monitor and prevent malicious traffic from entering or leaving your organization's network. Download this white paper to learn more about SIGs and the secure features they can bring to your organization.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

4 Considerations for Achieving a Zero Trust Network
sponsored by FireMon
WHITE PAPER: In a Zero Trust network security model, no communication, system, user, machine or packet goes anywhere without validation. But how do you make that happen? Read this white paper to learn about the 4 functions needed to establish a Zero Trust network, and tips for avoiding problems that could cause your strategy to fail.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

FireMon

Vendor Breakdown: Which Secure Email Gateway is Right for You?
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: Security and risk management leaders continue to rely on the secure email gateway (SEG) as a critical component of their security strategy in an evolving threat environment. But which SEG is the right one for you? Download this Gartner Market Guide for SEGs to compare vendor capabilities and see which tool is best for your organization.
Posted: 07 Sep 2018 | Published: 03 May 2017

Proofpoint, Inc.
1 - 25 of 586 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement