Security Foils ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Foils Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Virtualization
 •   Security Policies
 •   Security Monitoring
 •   Application Security
 •   Network Management
 •   Wireless Security
 •   Networks
 •   Storage Security

Related Searches
 •   Plan Security
 •   Planner Security Foils
 •   Security Foils Architecture Improve
 •   Security Foils Guidelines
 •   Security Foils Hawaii
 •   Security Function
 •   Security New Jersey
 •   Security Spreadsheets
 •   Use Security Foils
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months by MarkMonitor

October 2008 - (Free Research)
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month. 
(CASE STUDY) READ ABSTRACT |

Advanced cyber-security intelligence by ComputerWeekly.com

July 2012 - (Free Research)
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. 
(ANALYST REPORT) READ ABSTRACT |

IT Handbook: VM Automation in the Private Cloud - Enforcing Policies to Meet Compliance and Security by OnX USA LLC

September 2011 - (Free Research)
To ensure your enterprise meets compliance and security standards for external audits, your security settings must be properly configured. This is even more important in the private cloud, which introduces a wealth of new security threats. 
(EBOOK)

Designing Artificial Intelligence for Games (Part 1) by Intel Software Network

June 2009 - (Free Research)
This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors. 
(WHITE PAPER)

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Enterprise Security Architecture by ComputerWeekly.com

March 2013 - (Free Research)
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. 
(PRESENTATION) READ ABSTRACT |

Enterprise Security Architecture – an outsourcer's view by ComputerWeekly.com

March 2013 - (Free Research)
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

Differentiated Architectures for the Data Center by Juniper Networks, Inc.

September 2011 - (Free Research)
The promise of the cloud for data centers is that it converts all of the compute and storage capacity into pools of resources which can be dynamically allocated and shared. Shared resources are more efficient than resources in silos. With cloud computing, applications can be added quickly and they function more efficiently. 
(WHITE PAPER) READ ABSTRACT |

PCI-Compliant Cloud Reference Architecture by HyTrust

July 2011 - (Free Research)
Check out this resource to learn how Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

CW+: Architecture for deperimeterisation of IT security by ComputerWeekly.com

October 2010 - (Free Research)
De-perimeterisation is the term coined by the Jericho Forum to describe the erosion of thetraditional ‘secure’ perimeters, or ‘network boundaries’, as a mediators of trust and security. 
(WHITE PAPER) READ ABSTRACT |

How to Unify Your Wireless Architecture Without Limiting Performance or Flexibility by D-Link

April 2010 - (Free Research)
So much is happening today to give you a chance to rethink your wireless architecture. Learn what to look for in a wireless architecture that not only provides the mobility and performance today’s applications need, but also lowers your costs of operations while increasing wireless security. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Information Security Magazine – July/August 2013 by SearchSecurity.com

August 2013 - (Free Research)
This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management. 
(EZINE) READ ABSTRACT |

Rethinking Information Security to Improve Business Agility by Intel

March 2011 - (Free Research)
To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Secure Cloud Access Reference Architecture & Use Model by Intel

March 2011 - (Free Research)
This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection). 
(WEBCAST) READ ABSTRACT |

Create the Optimal Architecture for Your Critical Applications by IBM

January 2009 - (Free Research)
IBM has the vision, expertise, experience and product offerings that enable you to build an optimal architecture for application performance that drives business success. 
(WHITE PAPER) READ ABSTRACT |

Cisco Smart Business Architecture by Cisco (E-mail this company)

February 2013 - (Free Research)
This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security. 
(WHITE PAPER) READ ABSTRACT |

Business Oriented Information Architecture by Sybase, an SAP company

April 2012 - (Free Research)
This paper outlines an information architecture (IA) and why it is useful in determining everything from the robustness of IT projects to testing business process scenarios to see if they satisfy the wide-ranging needs of your business. Read this now to learn more about IA, including its basic design, how to start your program and more. 
(WHITE PAPER) READ ABSTRACT |

The Economics of Networking White Paper by Cisco Systems, Inc.

February 2012 - (Free Research)
Access this white paper to learn about a next-generation network architecture that paves the way for true business innovation with architectural benefits that empower IT to say “yes” to new business opportunities and the ever-changing work environment. 
(WHITE PAPER) READ ABSTRACT |

Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation

March 2011 - (Free Research)
The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today. 
(WHITE PAPER) READ ABSTRACT |

Planning for Cloud: How enterprise architecture management can help drive your IT transition by IBM

September 2011 - (Free Research)
Is your organisation ready to explore the benefits of cloud computing? Read this white paper from IBM and discover how an enterprise architecture approach can help you take the first critical steps to success with Cloud. 
(WHITE PAPER) READ ABSTRACT |

Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g by Oracle Corporation

June 2012 - (Free Research)
While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues. 
(WHITE PAPER) READ ABSTRACT |

The Foundation of High-Value Business Intelligence: A Description of the WebFOCUS 7.1 Architecture by Information Builders

June 2006 - (Free Research)
Good architecture for information systems is as important as good engineering is for automobiles and with good architecture, applications can be scaled up with less hardware. 
(WHITE PAPER) READ ABSTRACT |

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

Security the future: Keeping up with the business by ComputerWeekly.com

March 2013 - (Free Research)
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts