IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 844 Matches Previous Page  |  Next Page
How Okta's Cloud First IT Strategy Enables a Dynamic Work Environment
sponsored by Okta
VIDEO: Back in 2009, 30% of organizations were using some sort of cloud computing. Since then, it has erupted into one of the most important aspects of an organization’s work environment. Watch this webinar to discover how cloud has changed and role it plays in enabling today’s dynamic workforce.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta

How Okta's IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
VIDEO: Before the COVID-19 outbreak, few government employees (federal, state and local) had the ability and authorization to work from home. Watch this webinar to learn what the new normal looks like for government agencies, the challenges that have surfaced and best practices for addressing them.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta

The Best Practices for Cloud Security Operations on AWS
sponsored by AllCloud
EBOOK: When it comes to cloud migrations, it’s important for organizations to recognize that they still own the responsibility of securing their cloud-based data and applications. To help you get started, this e-book provides a closer look at 6 areas to focus on for effective cloud security and overviews how to securely migrate to the cloud on AWS.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

AllCloud

Single Sign-On Without the Complexity
sponsored by Citrix
EBOOK: An improperly managed SSO forces organizations to implement several access solutions from different vendors to cover their application landscape. In doing so, any productivity and user experience benefits are wiped out, zero trust becomes more difficult and costs go up. Take control of security – read this e-book on Citrix Workspace SSO.
Posted: 28 Sep 2020 | Published: 20 Aug 2020

Citrix

Introducing Cortex XSOAR
sponsored by Palo Alto Networks
VIDEO: Security orchestration, automation and response (SOAR) has become key to effective security strategies. But, like any cybersecurity technology, yesterday’s SOAR capabilities have evolved to reflect the needs of today’s organizations. Watch this webinar to learn more about Palo Alto’s Cortex XSOAR and see how it compares to traditional SOAR.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Palo Alto Networks

Overhauling Endpoint Protection Aids Innovation and Strengthens Security Posture
sponsored by McAfee, Inc.
CASE STUDY: In this case study, follow the journey of Sutherland Global Services, a business process transformation provider with a growing number of global endpoints, as they partner with McAfee in order to provide 24/7 availability to their workforce, unify security processes and address compliance requirements.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

McAfee, Inc.

C-Suite Perspectives: Accelerated Cloud Migration But Lagging Security
sponsored by Radware
ANALYST REPORT: By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Radware

Cybersecurity Risk: A Board’s-Eye View Chapter 3
sponsored by PortSys
EBOOK: The zero trust market is becoming saturated, and organizations considering zero trust are having to do their homework when it comes to vendor selection and fit. For many, substantial factors will be ease of deployment and flexibility, as these will lower costs. Read this short brief to learn about Zero Trust Access by PortSys.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

Cybersecurity Risk: A Board’s-Eye View Chapter 2
sponsored by PortSys
EBOOK: When it comes to zero trust architecture, there is no one-size-fits-all package. It’s crucial that you consider which type of zero trust could best suit your organization, especially given the recent spike in vendors boasting zero trust capabilities. Read this short white paper to learn the 3 different flavors of zero trust.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

BotRx ProTx Mobile Application Security
sponsored by BotRX
DATA SHEET: Mobile applications have emerged as one of the most lucrative threat vectors for a cybercriminal interested in orchestrating a malicious bot attack. In order to protect your organization’s mobile app and subsequent data, security tactics need to be dynamic. Read this data sheet to learn how BotRx protects web and mobile apps against bot attacks.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

BotRX

Cybersecurity Risk: A Board’s-Eye View Chapter 1
sponsored by PortSys
EBOOK: IT security is broken – what will it take to fix it? A growing concern across board rooms and C-suites worldwide, security in a changing landscape has drawn more attention to a zero trust ideology. But how do you know if it could work for your enterprise? Jump into these 5 critical security questions to give your posture some consideration.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

BotRx ProTx for eCommerce
sponsored by BotRX
DATA SHEET: For eCommerce organizations, the increasing use of web and mobile apps present a potentially lucrative vector for hackers. In fact, nearly half of online traffic on eCommerce sites is malicious bots – so what can organizations do to protect against these threats? Read this data sheet to learn about how BotRx is helping their users.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

BotRX

Definitive Guide to Moving Target Defense for Automated Bot Attacks
sponsored by BotRX
WHITE PAPER: As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

BotRX

AI, CWPPs & DevSecOps: The Future of Cybersecurity
sponsored by Rezilion
EGUIDE: Artificial intelligence, DevSecOps and cloud security have all emerged as transformative technologies within the cybersecurity industry. This e-guide explores each of these areas by providing 3 expert articles. Read on to unlock your copy.
Posted: 25 Sep 2020 | Published: 01 Sep 2020

Rezilion

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

PortSys: Zero Trust e-book
sponsored by PortSys
EBOOK: Zero trust is gaining popularity due to its flexible approach to enterprise protection. According to the International Data Group, 52% of companies are researching or piloting a zero trust model. If you’re considering a model of your own, read these 5 security questions to learn where you stand, and to see where you could benefit from zero trust.
Posted: 25 Sep 2020 | Published: 01 Aug 2020

PortSys

Putting the Trust in Zero Trust
sponsored by Lookout
WHITE PAPER: As workforces become more distributed and employees favor their BYOD devices, cybersecurity risks evolve to the point where traditional perimeter tactics are no longer relevant. Enter zero trust for mobile – a scalable approach to protecting every device within the network. Read on to learn more about this.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

How Lookout Helps You Align with NIST Guidelines
sponsored by Lookout
CASE STUDY: When it comes to structuring cybersecurity strategies and initiatives, many organizations turn to guidelines and best practices outlined by the National Institute of Standard and Technology (NIST). In this case study, take a closer look at NIST’s updated mobile security guidelines and discover how Lookout can help get you aligned.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

How companies in Asia-Pacific are addressing remote workplace security challenges
sponsored by Barracuda
WHITE PAPER: According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Barracuda

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

ThreatQuotient

Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy
sponsored by Tehama
RESOURCE: As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Tehama

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

Securing the Remote Revolution
sponsored by AWS & CrowdStrike
EBOOK: Protecting modern remote workforces requires security capabilities that go beyond traditional approaches. This e-book provides an overview of the emerging adversary tactics targeting remote workforces and highlights new and effective cybersecurity strategies for a fully remote world – read on to get started.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

AWS & CrowdStrike
1 - 25 of 844 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info