IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 336 Matches Previous Page  |  Next Page
Drive Security Intelligence With Splunk
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk Services UK Ltd

Log Management Essentials
sponsored by One Identity
WHITE PAPER: In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

CW APAC buyer's guide to cloud security
sponsored by ComputerWeekly.com
EZINE: In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

ComputerWeekly.com

Reinvent Endpoint Security with Management Print Services
sponsored by HP
PRODUCT OVERVIEW: Download this white paper to learn about HP Secure Managed Print Services (MPS), and how they simplify print security by assessing risks, securing and managing your fleet, maintaining printer security compliance, and keeping everything up-to-date with the latest protections.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

HP

Building Networks with Security at Their Core
sponsored by 128 Technology
WHITE PAPER: Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

128 Technology

Authentication for Your Ever-Changing Needs
sponsored by Micro Focus
WHITE PAPER: In today's connected world, outsider threats are real and—at times—daunting. User credentials for access serve as an essential layer of defense. Learn about Micro Focus Advanced Authentication, which can enable secure interaction with employees, partners, and customers in this white paper.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Micro Focus

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Key Principles and Strategies for Securing the Enterprise Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

Top 7 Reasons Why Organizations Choose WhiteHat Security
sponsored by WhiteHat Security
RESOURCE: In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

WhiteHat Security

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create anxiety for the cybersecurity team. In Fortinet's 2018 Security Implications of Digital Transformation Survey, examine the state of cybersecurity in organizations around the world from the lens of digital transformation.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

How the Rapid Adoption of Public Clouds is Affecting Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Companies are increasingly moving data and applications to public cloud platforms. However, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. In this white paper, learn how public clouds demand particular attention from IT security managers for 3 reasons.
Posted: 28 Feb 2019 | Published: 28 Sep 2018

Fortinet, Inc.

Why Corelight Is Your Best Next Move in Enterprise Security
sponsored by Corelight
WHITE PAPER: The most sophisticated enterprises continue to be breached, attacked, and compromised. Most large organizations have deployed endpoint security solutions, but often times are still not enough. As a result, many companies are adding network-wide visibility for protection. In this white paper, learn about the benefits of Corelight Sensors.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Corelight

Four Ways to Improve Endpoint Security
sponsored by Fortinet, Inc.
WHITE PAPER: Endpoint devices continue to be one of the favorite targets for cyberattacks. To address this vulnerability, security leaders must integrate endpoint security into their network security architecture. In this white paper, learn how a deep connection between endpoint and network security offers key improvements to holistic enterprise protection.
Posted: 26 Feb 2019 | Published: 27 Aug 2018

Fortinet, Inc.

NPMD for Network Security Forensics
sponsored by Viavi
WHITE PAPER: Download this white paper to learn about network performance monitoring and diagnostics (NPMD) and network forensics and how they can help strengthen protection against ever-increasing cyberattacks, malware, and internal espionage threats.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Viavi

A Network Operations Guide for Intent-Based Segmentation
sponsored by Fortinet, Inc.
WHITE PAPER: Download this white paper to learn more about Intent-based Segmentation and how it can help you effectively improve security posture, mitigate risks, and support compliance and operational efficiency—without altering your network architecture.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Fortinet, Inc.

IBM i Encryption: How to Protect Your Database
sponsored by HelpSystems
WHITE PAPER: Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

HelpSystems

How To Secure IaaS/PaaS Effectively: Customer Responsibilities in the Shared Security Model
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

MASERGY

5 Things You Need to Know about a Web Application Firewall
sponsored by Neustar
WHITE PAPER: Web Application Firewall (WAF) is a priority item for IT professionals who are struggling to protect their customer-facing and mission-critical applications. WAFs detect and protect web applications from attacks that try to exploit vulnerabilities. In this white paper, learn 5 things you need to know before buying a WAF.
Posted: 14 Feb 2019 | Published: 13 Apr 2018

Neustar

Scaling Network Security
sponsored by Gigamon
ANALYST REPORT: Network speeds continue to increase, putting a strain on security controls that can't scale at the same rate as the networks. Read this research paper to review different network architectures that were designed with security in mind. Also learn about current requirements for today's networks, as well as guidelines for the future.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Gigamon

Four Steps to Developing a World-Class Security Program
sponsored by Dell SecureWorks
WHITE PAPER: A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Dell SecureWorks

Evolving Your Security Architecture to Meet Current and Future Needs
sponsored by Dell SecureWorks
WHITE PAPER: The security of an organization is dependent on the quality of its enterprise information security architecture. A security architecture should be designed for the specific organization it's going to protect. In this white paper, learn how to define your security needs and reassess your security architecture as new threats develop.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Dell SecureWorks

Transform Network Traffic into High-fidelity Logs for Analysis
sponsored by Corelight
PRODUCT OVERVIEW: Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Corelight

An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

Corelight

Tuning Your Log Volume
sponsored by Corelight
WHITE PAPER: In this white paper, learn how filtering can help reduce log volume and make it more manageable and useful—rather than letting it unintentionally fill up disks or drive up SIEM costs.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Corelight

How 1 Hospital Transformed Network Security
sponsored by Micro Focus
CASE STUDY: When network performance fell at a major North American hospital, it was a sign that years of IT security neglect had led to serious problems. The hospital had developed a reputation as a soft target and experienced daily network attacks. Read this case study to learn how this hospital began addressing threats before they become a problem.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Micro Focus
1 - 25 of 336 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement