IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 390 Matches Previous Page  |  Next Page
CyberArk Blueprint for Privileged Access Management Success
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access management (PAM) is critical to securing an organization’s sensitive data against threats targeting individuals and accounts. To help get started, CyberArk developed a blueprint designed to help organizations improve PAM systems and practices, reduce security vulnerabilities and mitigate risk. Read on to unlock the blueprint.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

CyberArk Software, Inc

Model Risk Management: Special Report 2019
sponsored by SAS
WHITE PAPER: Organizations, especially financial service providers, are adopting model risk management (MRM) tools to automate tedious, time-consuming tasks to allow IT teams to focus their efforts on high-level, strategic initiatives. In this white paper, join risk management industry leaders as they engage in a Q&A to highlight the benefits of MRM tools.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

SAS

A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

Digital Transformation: Market Opportunity & Threats for MSPs
sponsored by PortSys
RESOURCE: In 2019, at least 13 managed service providers (MSPs) were compromised by ransomware. MSPs remain attractive targets for hackers, which will likely lead to a rise in breach attempts. So, can MSPs be trusted as secure partners? This blog post breaks down the market opportunity and potential security risk for MSPs.
Posted: 27 Feb 2020 | Published: 19 Feb 2020

PortSys

2019 Crowdstrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.
Posted: 21 Feb 2020 | Published: 15 Nov 2019

CrowdStrike

Observations from The Front Lines of Threat Hunting
sponsored by CrowdStrike
WHITE PAPER: Falcon OverWatch is a CrowdStrike managed threat hunting service, comprised of a team of specialists who analyze networks to identify, isolate and hunt cyberattackers. Download this report to view the key trends and recommendations from OverWatch’s threat hunting findings.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

CrowdStrike

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

The Essential Guide to Secure Web Gateways
sponsored by AT&T Cybersecurity
RESOURCE: Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.
Posted: 21 Feb 2020 | Published: 13 Jan 2020

AT&T Cybersecurity

The Risk Conversation
sponsored by IT Glue
EBOOK: This e-book provides guidelines for having the risk conversation with your clients and how it can benefit you as an MSP. Download now for more info on the 4 pillars of risk management, using risk assessments in sales and QBRs, and more
Posted: 21 Feb 2020 | Published: 21 Feb 2020

IT Glue

Data Security for the Way People Work
sponsored by Dell and Intel
WHITE PAPER: Faced with a growing array of threats and the challenge of enabling the mobile workforce, IT leaders should tailor their security strategy to focus on the way end users work. Download this report to uncover the common threats and key tactics to consider when implementing a security plan.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Dell and Intel

Federal Agency Turns to SAIC for Cybersecurity Resiliency
sponsored by Gigamon
CASE STUDY: A large U.S. federal agency brought in SAIC (Science Applications International Corporation) to assess and revamp their aged network security infrastructure. Learn how the SAIC team brought new security tools into the agency’s infrastructure and helped improve their security posture and network operations.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Gigamon

NIST Cybersecurity Framework Implementation Overview
sponsored by Absolute Software Corporation
WHITE PAPER: In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation. Read on to get started.
Posted: 17 Feb 2020 | Published: 29 Oct 2018

Absolute Software Corporation

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

2019 SANS Automation & Integration Survey
sponsored by D3 Security
WHITE PAPER: While automation may not be a new concept, advancements in technology and the growing threat of cyberattacks has increased its popularity among security professionals. The results from 2019’s SANS Automation & Integration study highlight the presence of security automation in today’s organizations and look at common automation misconceptions.
Posted: 14 Feb 2020 | Published: 31 Mar 2019

D3 Security

Fujitsu & VMware – Multi-Cloud Security
sponsored by Fujitsu
WEBCAST: In this video, Fujitsu & VMware experts offer insights, guidance, and solutions to overcome the challenges of cloud security to ensure your applications, workloads and data are ‘secure by design’ – whether at rest or in motion as you transform.
Posted: 13 Feb 2020 | Premiered: Dec 3, 2019

Fujitsu

Redefining security analytics with Chronicle Backstory
sponsored by Chronicle
WHITE PAPER: Today’s security teams face several challenges: from escalating threats and expanding networks and devices to the increased pressure of meeting security requirements. In this white paper, take a closer look at the 5 security requirements to include in your strategy and learn more about Chronicle’s Backstory data platform.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Core - DNS - Threat Intelligence – the new driver for incident response
sponsored by Cisco Umbrella
WEBCAST: Malware attacks in the financial services industry have grown considerably over the past year. Organizations are finding that they require complete network visibility to consolidate disparate security efforts and establish a strong resiliency program. In this webinar, discover the foremost threats of 2019 and how integrated security can help.
Posted: 07 Feb 2020 | Premiered: Jan 15, 2020

Cisco Umbrella

Cybersecurity and Education: The State of the Digital District in 2020
sponsored by Absolute Software Corporation
WHITE PAPER: Technology in the classroom is on the rise, and securing these critical endpoints grows increasingly challenging for K-12 IT teams. In 2019 alone, 49 separate school districts were victims of ransomware attacks. Check out this research report to learn more about the security threats and tactics plaguing our school systems.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Absolute Software Corporation

L.A. Tourism and Convention Board
sponsored by Absolute Software Corporation
CASE STUDY: As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.
Posted: 07 Feb 2020 | Published: 06 May 2019

Absolute Software Corporation

Core - DNS - Network Security for SD-WAN
sponsored by Cisco Umbrella
WHITE PAPER: According to a 2019 study, 68% of security breaches involved branch offices and roaming users as the source of compromise. Download this white paper to find out how to deliver network security for today's evolving WAN networks and protect remote and roaming users.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

9 Steps to Success with Data Protection
sponsored by Forcepoint
RESOURCE: Data protection requires visibility of your network in order to understand where the likely risks lie and acting before they strike. As simple as it may sound, this can be a daunting task. These 9 steps will walk you through how to implement effective data protection controls. Read on to get started.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

All Clouds Are Not Equal
sponsored by Forcepoint
EBOOK: When it comes to cloud security, there are a good deal of misconceptions that persist.In fact, security concerns are usually the main reason why an organization stays away from cloud. In this e-book, debunk the 5 most common cloud security misconceptions and learn what to look for in a cloud-based security solution.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Rethinking Data Protection: The Human-centric Approach
sponsored by Forcepoint
EBOOK: It’s predicted that there will be 1.87 billion mobile workers worldwide by 2022, representing 42.5% of the global workforce. As mobile devices grow, the idea of a traditional perimeter begins to fade. Download this e-book and learn why organizations are adopting a user & data-centric approach to multi-cloud security.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Securing Your Wherever Whenever Workforce
sponsored by Forcepoint
EBOOK: Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint
1 - 25 of 390 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info