IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
76 - 100 of 3276 Matches Previous Page  |  Next Page
7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper offers 7 key questions to ask when selecting an incident response service provider, to help you evaluate vendors based on your organization's needs.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

Dell SecureWorks

Workplace Mobility for Nuclear Plant Maintenance
sponsored by Atos
RESOURCE: When your workforce relies on mobile devices to do their jobs, you need to provide the devices or run major security and compliance risks. This infographic runs down the necessities that you need to look for when considering devices, as well as the challenges solved by automated device provisioning and lifecycle management.
Posted: 19 Dec 2017 | Published: 19 Dec 2017

Atos

Using Machine Learning and Analytics to Close the Security Skills Gap
sponsored by RSA
WHITE PAPER: This resource provides insight into utilizing analytics and machine learning to reduce the load on security professionals, while increasing visibility and predicting attackers' next steps.
Posted: 19 Dec 2017 | Published: 19 Dec 2017

RSA

Measuring Cybersecurity Preparedness
sponsored by Dell SecureWorks
WHITE PAPER: According to the 2017 Cybersecurity Breaches Survey, 7 in 10 large UK enterprises experienced an attack or breach within the past 12 months. This Frost & Sullivan white paper reveals the overall cybersecurity preparedness of large UK organizations and places organizations in 3 categories: underprepared, in transition and security leaders.
Posted: 18 Dec 2017 | Published: 18 Dec 2017

Dell SecureWorks

Your GDPR Plan: 4 Steps to Bolster Security and Meet Compliance
sponsored by Dell SecureWorks
WHITE PAPER: Getting GDPR compliant can be a valuable competitive differentiator between organizations. To maximize the benefits and minimize the security risks, taking the right approach to compliance is vital. This white paper reveals a 4-step plan to bolstering security to meet GDPR compliance standards.
Posted: 18 Dec 2017 | Published: 18 Dec 2017

Dell SecureWorks

A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
sponsored by Delphix
WEBCAST: Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.
Posted: 15 Dec 2017 | Premiered: Dec 6, 2017

Delphix

CIO Trends #6: Nordics
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

ComputerWeekly.com

Definitive Guide to Third-Party Risk Management
sponsored by Navex Global
RESOURCE: According to a Navex Global Benchmark Report, 1/3 of respondent organizations have faced legal or regulatory issues that involved third parties, with 50% involving average costs per incident of $10,000 or more. Take a look at this 30-page guide to learn how to successfully mitigate your organization's third-party risks.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Navex Global

Data Defense Doesn't Win Championships
sponsored by Delphix
RESOURCE: Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Delphix

Data Management Platforms for GDPR: Buyer's Checklist
sponsored by Delphix
RESOURCE: Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.
Posted: 12 Dec 2017 | Published: 31 Oct 2017

Delphix

GDPR Requirements for Data Masking
sponsored by Delphix
WHITE PAPER: This white paper takes a look a data masking – one of the many techniques businesses can take advantage of when getting ready for the GDPR. Learn more about what data masking is and find out how to improve protection for sensitive data.
Posted: 12 Dec 2017 | Published: 30 Sep 2017

Delphix

How to create a near-perfect Windows 10 deployment
sponsored by Flexera Software
EGUIDE: Deploying Windows 10 successfully may seem like a daunting task. In this e-guide find out how IT can make it happen by creating storage room, implementing tough security and knowing what to avoid.
Posted: 11 Dec 2017 | Published: 07 Dec 2017

Flexera Software

DataOps for Data Privacy and Security
sponsored by Delphix
WHITE PAPER: Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.
Posted: 11 Dec 2017 | Published: 30 Nov 2017

Delphix

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Anti-Bribery and Corruption Risk Assessment Checklist
sponsored by Navex Global
WHITE PAPER: This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Navex Global

The Millennial Mindset
sponsored by Navex Global
EBOOK: This eBook identifies the challenges and opportunities facing multigenerational workforces and offers a compliance and ethics strategy geared toward the millennial mindset.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Navex Global

Digital Transformation Starts Here
sponsored by AdvizeX Technologies
WHITE PAPER: Roughly half of businesses don't know what their industry will look in three years, and 45% of businesses are worried about becoming obsolete over the next three to five years. Find out which three aspects of your IT department need to be transformed to keep your organization alive during the tumult of the next five years.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

AdvizeX Technologies

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: Discover the 10 network security tools and tests that you should consider implementing and know how to use.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Global Knowledge

Using Security Automation for Continuous Deployment Cycles in the Cloud
sponsored by CloudPassage
WHITE PAPER: Explore this article to uncover ways to advance and automate your cloud security to emphasize speed, flexibility and integration to keep up with the shift to the progressive DevOps practices.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

CloudPassage

The "Patient Zero" Problem and the Need for Modern Endpoint Protection
sponsored by Palo Alto Networks
RESEARCH CONTENT: The digital era requires the need for a modernized approach to endpoint protection. In this IDC research paper, learn how to address and overcome the latest network security challenges. Then, discover IDC's 5 fundamental rules for modern endpoint security.
Posted: 30 Nov 2017 | Published: 30 Jun 2017

Palo Alto Networks

How to Build a High Performance Secure Network
sponsored by Aruba Networks
RESOURCE: Inside this resource learn how Aruba's UEBA tool, Introspect, helps detect attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Aruba Networks

10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 30 Nov 2017 | Published: 20 Nov 2017

D-Link

What your Network Security Strategy Should Include
sponsored by Aruba Networks
DATA SHEET: IT pros strive to provide secure device-based network access control for employees, contractors and guests across any multivendor wired, wireless and VPN infrastructure. In this resource, discover the key features of Aruba's ClearPass to help build a stronger network security strategy for your organization.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Aruba Networks

How to Gain Visibility and Control of your Networks, Users and Devices
sponsored by Aruba Networks
RESOURCE: Learn what's needed to build a highly secure network that provides the control, visibility and reliability needed to deliver a secure computing experience from the edge, to the core, to the cloud.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Aruba Networks

Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
sponsored by Juniper Networks, Inc.
EGUIDE: This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
Posted: 01 Dec 2017 | Published: 28 Nov 2017

Juniper Networks, Inc.
76 - 100 of 3276 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement