IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
1 - 25 of 1247 Matches Previous Page  |  Next Page
How to Protect your Business by Limiting Attack Dwell Time
sponsored by Viavi
WHITE PAPER: For security teams, it may be more realistic to assume that successful attacks against your IT resources can and will occur, rather than trying to prevent them altogether. For such an approach to work, you must minimize the dwell time of attacks. Examine this white paper to see how VIAVI’s Observer platform could help you do so.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Viavi

Burdens of Homegrown Customer Identity that Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta

The Secret to Modern Application Security
sponsored by NGINX
WHITE PAPER: The ‘build once, run anywhere’ approach to modern application development can be applied to application security—with a few adjustments, of course. By introducing automation into security strategies, developers can deliver a ‘build once, adhere everywhere’ guideline for security policies. See how NGINX App Protect does just that and more here.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

TOPICS:  Security
NGINX

Minimizing the Impact of the Cybersecurity Skills Shortage
sponsored by Trustwave
WHITE PAPER: Organizations across the world have unfilled cybersecurity vacancies, and the cybersecurity professionals already on staff are pushed to their limits. Access this whitepaper learn more about the cybersecurity skills shortage and the use of advanced security services and technologies that more effectively leverage the time of current professionals.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trustwave

Best Practices DNS: The First Principle of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

Secure SD-Wan for the Cloud-First Enterprise without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Protecting the Human Side of Cybersecurity
sponsored by Forcepoint
WHITE PAPER: Download this report to get educated on behavioral analytics cybersecurity and Forcepoint’s BA offering.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TOPICS:  Security
Forcepoint

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies
sponsored by Smarsh
WHITE PAPER: The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

The 10 Things Your MDR Service Must Do
sponsored by Rapid7
WHITE PAPER: Before assessing managed detection and response (MDR) vendors, it is crucial for an organization to evaluate each vendor based on 10 things they should be able to offer. Open up this white paper to uncover what to look for, including deep observation, threat validation and more.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
Rapid7

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Revolutionizing Cybersecurity
sponsored by Forcepoint
WHITE PAPER: This in-depth white paper offers strategies for organizations to revamp their cybersecurity and implement a zero-trust approach. Some topics include how to make SASE a board-level priority, how to solve the trust dilemma and more. Open now to take a look.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
Forcepoint

Adopting a Strategic Mindset for Cloud-Native Application Protection
sponsored by AWS Checkpoint
WHITE PAPER: As cloud-native applications become more and more of the norm, it’s not just developers who need to keep up. Security teams must adopt a strategic mindset for cloud-native application protection—one that prioritizes threat visibility, automation, and container security. Learn how to adopt the right security-forward mindset in this guide.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
AWS Checkpoint

Solution Brief: The Value of Multi-Vector Protection on the Endpoint
sponsored by Malwarebytes
WHITE PAPER: Today cybercriminals have moved to a multi-vector attack approach. It combines a mixture of social, malware, and hacking, which represent the triple threat in their multi-vector attack technique. And it's working. This means your endpoint security must protect from all 3. Read on to learn about a single solution for these multi-vector attacks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

6 Ways BAS Increases Cybersecurity ROI
sponsored by Cymulate
WHITE PAPER: This white paper outlines 6 ways that BAS can increase your cybersecurity ROI. Download the PDF to get started.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

TOPICS:  Security
Cymulate

Automated Endpoint Incident Response: An Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Explore the current market influences that impact the need for automated cyber response and the key methods that can be adopted to compress response times.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

Malwarebytes

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

The 5 Critical Steps in Your Endpoint Security Strategy
sponsored by BeyondTrust Corporation
WHITE PAPER: Learn about the security risks and challenges to securing endpoints, the 5 essential pieces of a modern endpoint security program and how modern endpoint security solutions reduce risk and work together as part of a holistic strategy.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

BeyondTrust Corporation

Using Compliance Budgets to Build a Red Team Capability
sponsored by Randori
WHITE PAPER: In this white paper, learn how a red team solution can validate what’s working and what needs to be addressed at your organization.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

TOPICS:  Security
Randori

Security White Paper: Data Security is Serious Business.
sponsored by Alchemer
WHITE PAPER: The digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alchemer

Incident Response: Prepare for the Unpredictable
sponsored by Fortinet, Inc.
WHITE PAPER: Nearly 80% of organizations are introducing innovations faster than they can secure them against cyberattacks. So you must understand the nature, scope and risks posed by incidents as well as the specialized tools, skills and repeatable processes for defending against them. Access this white paper by Fortinet to get schooled on incident response.
Posted: 17 Feb 2021 | Published: 21 Aug 2020

Fortinet, Inc.

Effective AI-Driven Security Operations
sponsored by Fortinet, Inc.
WHITE PAPER: For organizations to achieve their digital innovation outcomes while effectively managing complexity and defending against advanced threats, teams need a broad, integrated and automated cybersecurity platform. Download this white paper to discover Fortinet Security Fabric, an AI-driven platform with APIs to help manage security in unison.
Posted: 17 Feb 2021 | Published: 22 May 2020

Fortinet, Inc.

Cybersecurity is Improving, But is it Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

Integrated Cybersecurity Model for Your Work-From-Anywhere Environment
sponsored by NWN Corporation
WHITE PAPER: Cybercrime was lucrative across 2020 – the pandemic exposed several security gaps that hackers were eager to exploit. This white paper highlights how the Integrated Cybersecurity Model can help protect remote workforces from today’s evolving cyberthreats – read on to learn more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

NWN Corporation

Secrets to a Stronger Strategy for Container Security
sponsored by Alert Logic
WHITE PAPER: 58% of developers report that their companies use or plan to use containers in the next 12 months. Despite their smaller footprint and attack surface, containerized environments are still vulnerable. But setting up container security isn’t as mysterious as you may think. Leverage this AWS white paper to learn 8 secrets to securing containers.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Alert Logic
1 - 25 of 1247 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info