IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 3276 Matches Previous Page  |  Next Page
PCI DSS Compliance: Best Practice Checklist
sponsored by Semafone
WHITE PAPER: With a multitude of systems, people, and processes within the call center, securing sensitive customer data has become increasingly challenging, and this is why the PCI DSS regulation was implemented. Explore this resource to uncover a PCI DSS checklist to gauge your compliance readiness.
Posted: 05 Jan 2018 | Published: 05 Jan 2018

Semafone

How to update, automate your IR processes
sponsored by Booz Allen Hamilton
EGUIDE: In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Booz Allen Hamilton

Recommendations for Secure Policy Configuration Assessment
sponsored by FireMon
WHITE PAPER: According to Gartner, secure configuration assessment is essential for identifying risks arising out of weak and misconfigured systems and devices. This resource offers strategies for achieving Gartner's 4 recommendations for secure policy configuration assessment.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

FireMon

The Top 5 Requirements to Look for in Your Network Security Policy Management Solution
sponsored by FireMon
WHITE PAPER: In the last 20 years, network security policies have grown by more than 3,500%, according to FireMon.This resource examines the top 5 requirements to look for in your networking security policy management strategy.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

FireMon

SIEM For Beginners: Everything to Know about Log Management
sponsored by AlienVault
WHITE PAPER: The more valid information depicting your network, systems, and behavior the SIEM has the more effective it will be in helping improve your security operations.This resource provides insight into the basics of log management and how improving your SIEM can boost your security posture.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

AlienVault

The 3 Keys to Faster Threat Response
sponsored by RSA
WHITE PAPER: According to the latest RSA study rating organizations' cybersecurity maturity, 74% of those surveyed have inadequate systems to quickly recover from an attack. Explore this e-book to uncover a deeper understanding into 3 keys to a faster threat response.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

DTMF Masking for PCI DSS Compliance
sponsored by Semafone
WHITE PAPER: PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Semafone

How SMBs are Changing their Security Tactics
sponsored by Booz Allen Hamilton
EGUIDE: Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Booz Allen Hamilton

Extending Security Technology to the Cloud: Threat Detection & Response
sponsored by RSA
WHITE PAPER: According to Gartner, spending on cloud system IaaS will grow from $34 billion in 2017 to $71 billion through 2020. This white paper offers strategies for improving threat detection and response within cloud technologies.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

5 Ways to Boost Your Security Team's Impact
sponsored by RSA
WHITE PAPER: 93% of security operations center (SOC) managers are unable to triage all potential threats. Explore this resource to uncover 5 tools to boost your security team's impact.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

Password Management and GDPR Compliance
sponsored by Fast Pass Corp
RESEARCH CONTENT: This IDC Technology Spotlight introduces the identity and access implications of GDPR, and shows why password reset represents a potential risk factor that may compromise compliance. Find out how self-service password reset can lower this risk to help your organization follow GDPR guidelines.
Posted: 02 Jan 2018 | Published: 31 Jan 2017

Fast Pass Corp

How IT Services are Implementing Fastpass Security Tools
sponsored by Fast Pass Corp
CASE STUDY: In this case study, find out how CCBC IT Service successfully reduced calls to the IT Service Desk with a self-service password reset tool. Learn how this strategy helped to maintain current call performance without increasing staffing levels.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

Fast Pass Corp

Business-Driven Security and the GDPR
sponsored by RSA
WHITE PAPER: As the GDPR quickly approaches, privacy and data protection will no longer be "nice to have" benefits. Lacking them will become critical risks, both financial and reputational. Access this whitepaper for insight into data protection mandates in the GDPR and how your organization can get prepared.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

RSA

How Does Mobile Device Management Differ from Traditional Security?
sponsored by Seqrite
WHITE PAPER: In this white paper explore the need for an mobile device management (MDM) system, as well as several best practices for selecting and deploying a comprehensive MDM solution to your enterprise in a way that will be beneficial to security, and intuitive for employees.
Posted: 28 Dec 2017 | Published: 28 Dec 2017

Seqrite

Unified Threat Management: A Modern Solution to a Modern Problem
sponsored by Seqrite
WHITE PAPER: Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Data Loss Prevention: Best Practices
sponsored by Seqrite
WHITE PAPER: In order to minimize the damage data loss does to your organization, you need a strong data loss protection solution. This white paper details the 3 types of data you need to be securing, as well as some best practices to keep in mind.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Five Reasons to Collaborate in the Cloud
sponsored by BT
RESOURCE: There are 5 key reasons why collaboration in the cloud is worth the investment. Explore what they are in this resource.
Posted: 26 Dec 2017 | Published: 26 Dec 2017

BT

Threats Posed by Portable Storage Devices
sponsored by Seqrite
WHITE PAPER: In this white paper, find out if security policies alone are the best solution to mitigate the risks posed by portable storage devices, as well as explore some of the threats that these devices pose if they go uncontrolled.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

Protecting Your Enterprise from Ransomware Attacks
sponsored by Seqrite
WHITE PAPER: Click inside to take a more in-depth look at what makes a ransomware attack unique, and why you need to take steps to protect yourself. Then, learn about 5 protection mechanisms you can put into place.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

How Automated Security Workflows Help you Stay Above Water
sponsored by VMware
WHITE PAPER: Explore the changing nature of risk in the data center and how network virtualization enables automation of your security operations.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

VMware

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

Comparing Security Information and Event Management Providers
sponsored by Splunk
RESEARCH CONTENT: With so many vendors on the market offering SIEM services that differ in subtle ways, how do you know which one is right for you? This Gartner Report seeks to answer that question by listing the pros and cons of 19 SIEM offerings so you can make your own informed choice.
Posted: 21 Dec 2017 | Published: 04 Dec 2017

Splunk

Secure the Workplace Without Locking Down Your People
sponsored by Atos
RESOURCE: What if I told you that you could secure your workplace without taking away employees' flexbility? Read on to learn about the guidelines you need to follow to make this happen and the topics you will need to address for the future of your workplace security strategy.
Posted: 20 Dec 2017 | Published: 28 Nov 2017

Atos

Maintain Control of the Workplace by Letting Go
sponsored by Atos
RESOURCE: In the digital workplace, you need to accommodate various workstyles while managing costs and keeping enough control to properly secure systems and data. Read on to see what you need to consider when transitioning to a digital workplace and how enabling employees to choose how they work yields more satisfied, productive workers.
Posted: 20 Dec 2017 | Published: 09 Nov 2017

Atos

Atos Workplace Mobility Factsheet
sponsored by Atos
WHITE PAPER: Discover a mobile device lifecycle management service that takes pressure off your IT team, prevents shadow IT from creeping into your organization, and leaves you in control of your devices.
Posted: 20 Dec 2017 | Published: 25 Oct 2017

Atos
51 - 75 of 3276 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement