Security Architecture Database UsaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Architecture Database Usa returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Security Policies
 •   Endpoint Security
 •   Managed Security Services
 •   Security Monitoring
 •   Application Security
 •   Wireless Security
 •   Virtualization
 •   Network Management

Related Searches
 •   Collection Security
 •   Improvement Security
 •   Security Architecture Rfp
 •   Security Desktops
 •   Security Package
 •   Security Tutorials
 •   Spreadsheets Security
 •   Technical Security Architecture
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Windows 2003/2000/XP Security Architecture Overview by Global Knowledge Network, Inc.

June 2005 - (Free Research)
Windows 2003 Server, its workstation cousin Windows XP, and its predecessor, Windows 2000, all bring substantial advances in both reliability and security compared to Windows NT 4.0. This briefing lays out the main security features of the Windows 2003 operating system family, and put them together into a "big picture" context. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Security Architecture by ComputerWeekly.com

March 2013 - (Free Research)
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. 
(PRESENTATION) READ ABSTRACT |

Enterprise Security Architecture – an outsourcer's view by ComputerWeekly.com

March 2013 - (Free Research)
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

Security Gateway Buyer's Guide by Intel

February 2011 - (Free Research)
If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity. 
(WHITE PAPER) READ ABSTRACT |

Security the future: Keeping up with the business by ComputerWeekly.com

March 2013 - (Free Research)
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Information Security Magazine – July/August 2013 by SearchSecurity.com

August 2013 - (Free Research)
This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management. 
(EZINE) READ ABSTRACT |

A New Security Approach for Today's Advanced Attacks by FireEye

December 2013 - (Free Research)
This paper examines the limitations of existing security solutions, and several security architectures, including sandbox-based products that can truly protect against today's advanced attacks. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks by FireEye

December 2013 - (Free Research)
The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Executive Roundtable - Optimizing Your Security Architecture by McAfee, Inc.

October 2009 - (Free Research)
In this executive roundtable discussion, Representatives from McAfee, Qualcomm, and HP discuss what keeps security pros up at night. New sophisticated attacks in the threat landscape are changing security needs. Read this presentation transcript to learn more about an integrated approach to handling these new needs. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Jericho Forum - the vision by ComputerWeekly.com

November 2010 - (Free Research)
Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation. 
(WHITE PAPER) READ ABSTRACT |

Rethinking Information Security to Improve Business Agility by Intel

March 2011 - (Free Research)
To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

SEKE Podcast - Introduction to Solera DeepSee by Solera Networks

February 2010 - (Free Research)
In this podcast presented by James Hilliard, host of the "See Everything, Know Everything" podcast, and Matthew Wood, Solera Networks' Chief Scientist, you'll learn about the DeepSee tool, which provides administrators, users and C-level executives at a corporation a way to see what is happening on a network in real-time. 
(PODCAST) READ ABSTRACT |

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems by Dell SecureWorks UK

August 2011 - (Free Research)
View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enabling Compliance with the PCI Data Security Standards by Vormetric

January 2007 - (Free Research)
Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing. 
(WHITE PAPER) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Gunner Peterson's Security Gateway Buyer’s Guide by Intel

March 2011 - (Free Research)
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations. 
(WHITE PAPER) READ ABSTRACT |

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection by Webroot

September 2013 - (Free Research)
This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks. 
(EGUIDE) READ ABSTRACT |

Overcoming virtualization security risks: Best practices by Kaspersky Lab

April 2012 - (Free Research)
Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks. 
(EGUIDE) READ ABSTRACT |

CW+: Overview of the Open Group Security Forum by ComputerWeekly.com

October 2010 - (Free Research)
The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations. 
(WHITE PAPER) READ ABSTRACT |

Preventing Weaponized Malware Payload in Advanced Persistent Threats: Strategies for Layered Endpoint Defense Against the APT Kill Chain by Lumension

February 2013 - (Free Research)
This white paper explores a solution through a defense-in-depth approach to endpoint security that will help bolster your security posture including: antivirus, device control, hard-drive and media encryption, and more. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation IPS for Dummies by Sourcefire

January 2013 - (Free Research)
Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook. 
(EBOOK) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts