IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 1010 Matches Previous Page  |  Next Page
Get The Green Light For Ransomware Protection
sponsored by arcserve
RESOURCE: For security pros hoping to convince business decision-makers to invest in ransomware protection, it’s critical to ‘speak their language’ by highlighting the most impactful data (revenue, consumer behavior, actual costs, etc.). Read this infographic for 7 tips to help convey the seriousness of ransomware.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

Office 365: Data Protection & Backups
sponsored by arcserve
VIDEO: Migrating to Office 365 equips organizations with the benefits of modern cloud environments. However, there are some challenges and considerations you need to be aware of, especially when it comes to data privacy and backups. Watch this short video to learn more.
Posted: 30 Nov 2020 | Premiered: 30 Nov 2020

arcserve

An Inside View into a Supply Chain Attack
sponsored by Panorays
WHITE PAPER: For the most part, supply chain attacks use malware to target laptops or other network devices. However, this white paper explores a supply chain attack that targeted a service provider. Read on to see how it differed, discover the warning signs of a pending attack and uncover 5 steps your organization should take to mitigate risk.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Panorays

Why Your Multifactor Authentication Platform Should Include Biometrics
sponsored by BIO-key International
WHITE PAPER: While passwords have traditionally provided the gateway to the web, they now provide open access to hackers and breachers. Cards, PINs and tokens were introduced to add an additional layer of security, but even these solutions have shown their inherent vulnerabilities. Browse this white paper to understand fingerprint biometric authentication.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

BIO-key International

Payoneer Achieves GDPR Readiness
sponsored by Panorays
CASE STUDY: For Payoneer, the introduction of the European Union’s GDPR exposed existing gaps in both their compliance and scalability capabilities. Read this case study to discover how they partnered with Panorays in order to address these challenges and achieve comprehensive, scalable GDPR compliance.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Panorays

Making the Future of Work Cyber-Secure and Sustainable
sponsored by NTT
WHITE PAPER: According to a survey undertaken for NTT Ltd., 83% of organizations have had to rethink their security to accommodate new ways of working. As a result, businesses have been presented with a plethora of security challenges – but perhaps they’re disguised as opportunities to make security more distributed. Examine this white paper to learn more.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

NTT

Device Security Is Crucial For Protecting Our Connected World
sponsored by Archetype
VIDEO: While digital transformations can equip your organizations with unmatched efficiency and agility, it’s critical to ensure security plays an equally critical role to ensure the security of connected devices. Watch this video to learn more about the threat of insecure devices and how to address it.
Posted: 30 Nov 2020 | Premiered: 20 Oct 2020

Archetype

In Conversation With… The Experts
sponsored by Archetype
RESOURCE: Digital transformation is generally regarded as an essential project for organizations to undertake – yet only 3% of organizations have successfully completed their projects. Why is that? Read on for an in-depth answer and discover the common hurdles of IoT security.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Archetype

Streamlining Onboarding and Offboarding Processes with Ivanti Identity Director
sponsored by Ivanti
CASE STUDY: Province Groningen in the Netherlands had been using a self-developed solution for employee onboarding, changes and offboarding. The system was already time-consuming, and after a while, it could no longer support these processes. Peruse this case study to understand how this province was able to secure a more efficient and effective solution.
Posted: 30 Nov 2020 | Published: 28 Feb 2019

Ivanti

The State of Election Security
sponsored by WhiteHat Security
WEBCAST: The topics of voter registration and election security were top-of-mind in 2020 – but what did we learn that we can use to better ourselves going forward? Watch this webinar, which overviews the state of election security, common threats, and best practices.
Posted: 30 Nov 2020 | Premiered: Nov 30, 2020

WhiteHat Security

Cloud Security Architecture for Zero Trust
sponsored by McAfee
WEBCAST: In today’s vulnerable world, access control with context through zero trust has given organizations the ability to allow access based on behavior. But what implications does this hold for cloud security? How does it affect user experience? Access this webinar to learn answers to these questions as well as zero-trust cloud security architecture.
Posted: 30 Nov 2020 | Premiered: Nov 30, 2020

McAfee

Improve Employee Privacy & Organizational Security
sponsored by Dtex
WHITE PAPER: Enterprise security systems often collect more data than they need to – this creates unnecessary privacy issues and raises costs associated with excess data storage and processing. So how can enterprises mitigate these issues while still improving security? Peer at this white paper to learn how to collect only the data you need.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Dtex

Lose My Trust Lose My Business.
sponsored by arcserve
RESOURCE: For consumers, trust is one of most important factors when making a purchase. So, it stands to reason that organizations that fall victim to ransomware attacks experience dramatic impacts on consumer behavior. Read this infographic, which provides statistics that further illustrate the impact of ransomware on trust.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

Manchester United praised for swift response to cyber attack
sponsored by ComputerWeekly.com
EGUIDE: The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
Posted: 30 Nov 2020 | Published: 27 Nov 2020

ComputerWeekly.com

Mattress Firm: Security and innovation
sponsored by Ivanti
CASE STUDY: As enterprises grow, their competitive advantage relies on their ability to innovate. However, too often, IT teams are spending their effort on tedious, manual tasks, limiting their time to innovate. Read this case study to learn how Mattress Firm, through their partnership with Ivanti, were able to address this issue.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Ivanti

NTT Ltd. and Palo Alto Networks – Secure Access Ecosystem
sponsored by NTT
DATA SHEET: Today’s businesses have to address a rapid increase in mobile workers, the sudden need for additional branch offices, cloud adoption, data security needs and the growing enforcement of governance, risk and compliance laws. How can they handle all these challenges? View this data sheet to see how NTT and Palo Alto Networks may be able to help.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

NTT

Remote and @ Risk
sponsored by Dtex
RESEARCH CONTENT: The global shift to enable remote workforces in 2020 created a number of operational hurdles and introduces a series of security risks – the most significant being insider threats. Read this threat report to learn more about the current state of security and how 2020 put organizations at higher risk.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Dtex

Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Taking Control of Your Post-COVID-19 Budget
sponsored by DomainTools
WEBCAST: With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Turning Over a New Leaf in Your Identity and Access Management Strategy
sponsored by Ivanti
WHITE PAPER: The transition from traditional role-centric identity and access management (IAM) to an effective technology-enabled, policy-driven strategy is a challenge. But a policy-driven path that looks more holistically at identity will be more dynamic and deliver more power and flexibility to IT. Take a look at this white paper to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Ivanti

Evaluating and Measuring DDoS Risk During the COVID-19 Era
sponsored by Akamai Technologies
WEBCAST: Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

Akamai Technologies

How Certification Can Add Assurance for Digital Transformation at Scale
sponsored by Archetype
WEBCAST: The role of security and trust in delivering mass digital transformation will provide significant growth across multiple markets. But it’s important that security leaders move with the times. Watch this 20-minute webinar to learn the device level security baselines that anchor devices, services and insights together.
Posted: 24 Nov 2020 | Premiered: Jul 15, 2020

Archetype

Smart Buildings: Establishing Trust with IoT Security
sponsored by Archetype
RESOURCE: An increasing number of business leaders now see the value of using IoT devices to provide data and insight into the indoor environment, and they’re calling these new smarter spaces ‘connected spaces’. So, what are the benefits of these new spaces, and what hurdles need to be overcome? Read this article to find out.
Posted: 24 Nov 2020 | Published: 24 Sep 2020

Archetype
1 - 25 of 1010 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info