Making Security ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Making Security Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Storage Security
 •   Network Management
 •   Storage Management
 •   Content Delivery Networks/ Web Application Acceleration
 •   Mobile Device Management

Related Searches
 •   Active Making
 •   Best Making Security
 •   Computer Making Security
 •   Issues On Making Security
 •   Making Delivery
 •   Making Security Architecture Designers
 •   Making Security Architecture Improve
 •   Making Security Architecture Manage
 •   Making Security Costs
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 19, 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 13, 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Improving Identity and Access Management in an SAP Environment by Dell Software

May 06, 2010 - (Free Research)
In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple. 
(WHITE PAPER) READ ABSTRACT |

SiteProtect and UltraDNS Solution: Double Your Protection by Neustar®

March 20, 2014 - (Free Research)
This exclusive paper examines a DNS solution that boasts fast DDoS mitigation responses, protecting both the DNS and HTTP layers so your site can withstand the most aggressive attacks. 
(WHITE PAPER) READ ABSTRACT |

Taking your enterprise mobile:  Executive checklist by Citrix

January 02, 2014 - (Free Research)
This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 19, 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Big Security for Big Data by Hewlett-Packard Company

December 31, 2012 - (Free Research)
This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Differentiated Architectures for the Data Center by Juniper Networks, Inc.

September 02, 2011 - (Free Research)
The promise of the cloud for data centers is that it converts all of the compute and storage capacity into pools of resources which can be dynamically allocated and shared. Shared resources are more efficient than resources in silos. With cloud computing, applications can be added quickly and they function more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – July/August 2013 by SearchSecurity.com

August 06, 2013 - (Free Research)
This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management. 
(EZINE) READ ABSTRACT |

Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation

March 08, 2011 - (Free Research)
The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today. 
(WHITE PAPER) READ ABSTRACT |

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 13, 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

Security Gateway Buyer's Guide by Intel

February 14, 2011 - (Free Research)
If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 02, 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

Tech Guide: Building and Optimizing Private Clouds by Dell, Inc. and Intel®

July 27, 2012 - (Free Research)
This Tech Guide from SearchNetworking.com explores the ins and outs of building and optimizing the private clouds.  In three articles, learn about application performance, top challenges you may encounter, and an overview of cloud computing architecture. 
(EGUIDE) READ ABSTRACT |

Disk-Based Backup and Recovery: Making Sense of Your Options by Datalink and NetApp

August 2008 - (Free Research)
This white paper details four enhanced data recovery (disk-based backup) architectures and provides guidance on how to determine whether or not those architectures would be an overall fit within the IT infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation

March 2011 - (Free Research)
The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today. 
(WHITE PAPER) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Gunner Peterson's Security Gateway Buyer’s Guide by Intel

March 2011 - (Free Research)
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Software-defined networking could make Network-as-a-Service a reality by Dell, Inc. and Intel®

July 2012 - (Free Research)
Read this e-guide to find out the role of OpenFlow as a software-defined networking architecture, its benefits, limitations and how it can make Network-as-a-Service (NaaS) a reality. Discover why OpenFlow NaaS would offer enterprises more control over data center and inter-data center cloud traffic than is available today with Ethernet or IP. 
(EGUIDE) READ ABSTRACT |

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges by F5 Networks

August 2007 - (Free Research)
Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey. 
(WHITE PAPER) READ ABSTRACT |

IMS Ready and Raring to Go: A New World of Voice, Video, and Data by F5 Networks

August 2007 - (Free Research)
The beliefs that IMS architecture is nearly identical to SOA within the enterprise application development market are not without merit. Read this paper to learn the key differences. 
(WHITE PAPER) READ ABSTRACT |

IDC Vendor Profile: CommVault Gains Market Share and Continues to Outperform Storage Software Markets by CommVault Systems, Inc.

February 2010 - (Free Research)
Over the past five years, the storage software industry has faced consolidation. Large incumbents have acquired innovative technology from start-ups and emerging companies. CommVault Systems (CVLT) is a data and information management software provider challenging traditional incumbents. 
(ANALYST REPORT)

Sleeping Android: the danger of dormant permissions by ComputerWeekly.com

March 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How to choose between scale-up vs. scale-out architecture for backup and recovery by ExaGrid Systems, Inc.

December 2012 - (Free Research)
In this white paper, you will gain insight on how to choose between scale-up verses scale-out architectures for backup and recovery. Explore the pros and cons of each and which one is more economical for your organization. 
(WHITE PAPER) READ ABSTRACT |

Virtual Data Center E-Zine Volume 32: Public vs. Private: Comparing Cloud Architectures by SearchDataCenter.com

April 2011 - (Free Research)
Before committing to a public or private cloud architecture, evaluate the benefits and especially the tradeoffs associated with each. Also in this issue, determine what needs are most important when planning your virtual applications, and find out how to monitor the performance of applications in the cloud. 
(EZINE) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts