IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 556 Matches Previous Page  |  Next Page
Managing Security on Shared Resources
sponsored by WinMagic
WEBCAST: Watch this video to learn about SecureDoc, an encryption tool that can help you strengthen security and maintain compliance, while enabling employees to use their own devices safely.
Posted: 15 Aug 2018 | Premiered: Apr 3, 2017

WinMagic

Strengthening Your Security with SecureDoc
sponsored by WinMagic
WEBCAST: Watch this short video to learn about protecting your assets with SecureDoc, which can help strengthen your organization's security and remain compliant.
Posted: 15 Aug 2018 | Premiered: Aug 15, 2018

WinMagic

Veeam Backup & Replication 9.5 Update 3: Infrastructure Hardening
sponsored by GreenPages Inc.
WHITE PAPER: This paper provides practical advice to help admins reduce their infrastructure attack surface so that they can confidently deploy Veeam services and lower their chances of being compromised. Read on for several measures to take to harden your Veeam Availability infrastructure against threats.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

GreenPages Inc.

Security and Compliance in the Cloud
sponsored by DXC Concerto
WHITE PAPER: With proper safeguards in place, business leaders can put their focus on building the business and growing profits. In this white paper, discover 7 lessons on security for you to apply so that you can be proactive and thorough with your approach to data protection.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

DXC Concerto

Success Metrics for Advanced Threat Detection
sponsored by Juniper Networks
RESOURCE CENTER: Cybercriminals want your money and it's your job to stop that from happening. Advanced threat detection can help, but how effective is your system really working? Download this article and learn how to measure the effectiveness of your advanced threat detection and cyber-automation systems.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Juniper Networks

Understanding Critical Data Protection
sponsored by InteliSecure
WHITE PAPER: Think of your business as your home. How would you secure your most important assets? Download this infographic to help you understand critical data protection with a comparison that's probably familiar: your home.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

InteliSecure

The Cloud Generation: A Perfect Storm of Security Challenges
sponsored by Symantec
WHITE PAPER: As cloud adoptions increase, organizations are realizing that securing their data is a lot harder. Some organizations are looking to secure web gateways (SWGs) to help fight off threats. Download this report to learn about SWGs and properly securing your organization in the cloud generation.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Symantec

Symantec Web Security Service
sponsored by Symantec
WHITE PAPER: As technology evolves, legacy security solutions are becoming less effective. That's where a secure web gateway (SWGs) solution can help. Using a SWG can help you secure all Internet traffic, not only web traffic. Download this report to learn about today's enterprise-security reality and why SWGs could be the key to protecting your data.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Symantec

How to Deploy a Security Information and Event Management Solution Successfully
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Before embarking on a SIEM implementation project, an organization needs to understand the overall project lifecycle. Download this Gartner research report to learn the phases of deployment, the key challenges to expect, and other vital information.
Posted: 10 Aug 2018 | Published: 14 Mar 2018

LogRhythm, Inc.

Security Automation: Risks & Rewards for Your Security Program
sponsored by Skybox Security
EBOOK: Organizations are struggling to find a sufficient amount of trained security staff to keep up with the evolving threat landscape. That's where automation can help. Download this collection of articles to learn about automation for security, and the risks and rewards that come with it.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Skybox Security

Vulnerability and Threat Trends: 2018 Mid-year Update
sponsored by Skybox Security
WHITE PAPER: Keeping up with the latest threat intelligence can help you better align your 2H 2018 security strategy. Download this research report to examine trends in vulnerabilities, exploits and threats, and much more.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Automated Security Management: The Importance of Visibility, Context and Automation
sponsored by Skybox Security
WHITE PAPER: Through 2020, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws, according to Gartner. But modern technologies, like automation, can help. This report provides an overview of essential security management tasks that can be automated and the components needed to ensure success.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Mid-year Threat Research Report: Hacking Trends and Prevention Tips
sponsored by Zscaler
WHITE PAPER: The Zscaler cloud serves more than 5,000 organizations across 100 data centers, processing over 35 billion requests a day, making it a target for hackers. Download this report to learn about current threat trends and what you can do to prevent hacking and strengthen security.
Posted: 08 Aug 2018 | Published: 31 Jul 2017

Zscaler

Making Sense of Mismatches
sponsored by Riskified
WHITE PAPER: In some cases, the presence of a mismatch translates to an instant red flag. But that is not always the case. This eBook provides insight into the most common types of mismatches found in good orders, including a deeper look at industry specific patterns, and how to handle them.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

Riskified

What's the Best Way for You to Manage Cybersecurity?
sponsored by IntSights
WHITE PAPER: Download this fill-in-the-blank guide to learn how you can take a dynamic and proactive approach to managing cybersecurity and preventing attacks.
Posted: 06 Aug 2018 | Published: 06 Aug 2018

IntSights

Computer Weekly – 7 August 2018: How digital is driving golf to the connected course
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how one of the most traditional of sports, golf, is turning to technology to engage a new audience and build the connected course. Industry legend Stephanie 'Steve' Shirley discusses skills, diversity in tech and Brexit fears. And we assess four of the biggest cloud storage providers. Read the issue now.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

ComputerWeekly.com

Securing Critical Infrastructure: Hacking Prevention in Different Industries
sponsored by Panda Security
WHITE PAPER: In the digital age, everyone is constantly connected. But that also means that everyone and every industry—ranging from oil pipelines to airport telephone systems—are susceptible to hackers. Download this white paper to learn about the damage hacking does to different industries, as well as what steps you can take to prevent an attack.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

Resilient Security Architectures: The Paradigm Shift is Here
sponsored by Ixia - Keysight
WHITE PAPER: In the current business climate, it's not a question of if your network will be attacked, but when it will be attacked and how. Learn about a new paradigm shift that's emerging in response to this pressure called security resilience.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

ThreatX

Worldwide Cloud Security Gateways Vendor Assessment
sponsored by McAfee, Inc.
RESEARCH CONTENT: As enterprises lose control over the different architectural components of the cloud, more uncertainty is introduced into the environment, and organizations must rethink their security programs. Learn about the key characteristics for a cloud security platform, from this IDC vendor assessment.
Posted: 02 Jul 2018 | Published: 29 Dec 2017

McAfee, Inc.

Why You Should Take Security in the Cloud
sponsored by Splunk
WHITE PAPER: This white paper highlights the benefits of running a security analytics platform in the cloud and explores the power of big data analytics and cloud-based security.
Posted: 29 Jun 2018 | Published: 29 Dec 2017

Splunk

8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE: Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018

Akamai Technologies

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER: A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018

Akamai Technologies

HSM Reimagined: Cloud Ready Encryption, Key Management and Tokenization as a Service
sponsored by Equinix
RESOURCE: More data in multi-cloud environments present increased security challenges, including the inability to obtain total control of encryption keys and data, malicious attacks and more. Learn how HSM as a Service provides cloud-ready encryption, key management and much more to help you stay protected.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Equinix
1 - 25 of 556 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement