- Showing 1 - 36 out of 66 results for "security architecture"Sort by:Featured
- SALESecurity Architecture - How & Why$100.00$125.00
15%
cash back
✕Cash back from MicrosoftThis is an offer from Microsoft. You'll get 15% cash back on this item from Microsoft Cashback. Learn more | Terms & conditionsRRoutledge USFree shipping
Product added to your wishlist! View wishlistSign in to see your saved products on any deviceProduct removed from your wishlist! View wishlistSign in to see your saved products on any deviceSomething went wrong. Please try again later.Product is added to compare already. Please refresh the page.Product is not found in compare. Please refresh the page.5 Products already added. Please delete existing selection to add this. Draft A Security Architecture | CIO's Guide to Transformation
SponsoredStrengthen data security and drive strategic initiatives by being prepared for a breach. Take a proactive approach to security in 2025. Learn how in Security Priorities 2025.Data Driven Strategies · Security & Risk · Operations · Best Practice Research
Service catalog: Optimize IT Processes, Security Consulting, Vendor Consulting0 trust architecture explained | Data-centric security
SponsoredFind out how Pexip Infinity can integrate with your existing Zero Trust strategy. Learn how Zero Trust is shaping the future of data security & how to optimize for itRansomware Protection Trends | 2025 Ransomware Trends
SponsoredFor resilience against cyberthreats use these ransomware best practices in your playbook. Ransomware attacks are devastating. Use these insights and trends to build resilience.Types: Backup, Recovery, Replication, Restore