IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
1 - 25 of 1250 Matches Previous Page  |  Next Page
8 Essential Elements of a Comprehensive IT Security Strategy
sponsored by Involta
WHITE PAPER: IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

Stripping The Malware Threat Out Of Powershell With Ensilo
sponsored by enSilo
WHITE PAPER: While intended for system administration and the automation of daily maintenance and management tasks, PowerShell has become a preferred tool for cybercriminals. In this white paper, learn more about how PowerShell is being leveraged by cyberattackers and how enSilo can protect your endpoints against this increasing threat.
Posted: 21 May 2019 | Published: 04 Apr 2018


9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Reducing Email Security Costs
sponsored by Mitigate Solutions
WHITE PAPER: Download this solution brief to learn how Mimecast Email Security can help protect your organization's employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance.
Posted: 20 May 2019 | Published: 20 May 2019


The Present and Future of Security Operations
sponsored by Splunk
WHITE PAPER: In this white paper, learn about several technologies, processes, and philosophical trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy.
Posted: 20 May 2019 | Published: 31 Mar 2019

Splunk

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

11 Guidelines for Minimizing Vulnerability for IBM z/OS while Improving Compliance
sponsored by BMC
WHITE PAPER: The traditionally under protected enterprise mainframe can be a huge target for hackers. So, how do you safeguard it? In this white paper, learn about 11 steps you can take to strengthen z/OS security and compliance—and safeguard your critical business data.
Posted: 20 May 2019 | Published: 20 May 2019

BMC

TrueSight Cloud Security
sponsored by BMC
WHITE PAPER: Download this resource to learn how TrueSight Cloud Security can automate security and compliance checks and remediation across your multi-cloud platforms.
Posted: 17 May 2019 | Published: 17 May 2019

BMC

Compliance Needs Drive Data Access Auditing Requirements
sponsored by BMC
WHITE PAPER: More and more regulations are being passed that dictate increased effort be exerted to better secure and protect the accuracy and privacy of enterprise data. So how can organizations ensure they are in compliance with these regulations (and others)? Download this white paper for 4 data access auditing techniques to help maintain compliance.
Posted: 16 May 2019 | Published: 16 May 2019

BMC

Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC

TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification
sponsored by TITUS
WHITE PAPER: One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.
Posted: 15 May 2019 | Published: 09 Nov 2018

TITUS

IT Transformation Challenges and How to Address Them
sponsored by Dell EMC
WHITE PAPER: Read this article to learn how you can overcome such challenges by providing employees with the tools they need to make more informed decisions and work more efficiently.
Posted: 15 May 2019 | Published: 15 May 2019

Dell EMC

A Guide to Achieving SaaS Security and Compliance
sponsored by Forcepoint
WHITE PAPER: The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

Real-Time Mainframe SIEM 101
sponsored by BMC
WHITE PAPER: SIEM systems have been the industry standard for enterprise network security, but the mainframe has been left out of this predominantly distributed discipline. In this white paper, learn how to launch a mainframe SIEM initiative. Also explore 4 steps to ensure malicious mainframe activity triggers a notification to the appropriate security system.
Posted: 14 May 2019 | Published: 14 May 2019

BMC

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

Exploring the Gray Space of Cybersecurity with Insights from Cognitive Science
sponsored by Forcepoint
WHITE PAPER: Cybersecurity is traditionally very good at identifying activities that are black or white—either obviously bad or clearly good. But there is a wide "gray space" between black and white, full of activities that are less clear. In this white paper, learn how to determine the best course of action in ambiguous scenarios.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

The CISO's Ultimate Guide to Securing Applications
sponsored by Synopsys
WHITE PAPER: In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

A Guide to WSO2 Identity Server
sponsored by WSO2, Inc.
WHITE PAPER: WSO2 Identity Server aims to address both API and user domains while providing an enhanced user experience as part of WSO2's open source Integration Agile Platform. Read on to learn more about the benefits and use cases of WSO2 Identity Server.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.

Why CASB Alone Isn't Enough
sponsored by Open Systems Technologies
WHITE PAPER: Download this white paper to learn about the benefits of a complete web protection platform and why a CASB is no longer enough.
Posted: 13 May 2019 | Published: 13 May 2019


The Case for Open Source IAM
sponsored by WSO2, Inc.
WHITE PAPER: Open source IAM solutions are now gaining attention from enterprises similar to proprietary and commercial IAMs. Why? In this white paper, learn all about the benefits and use cases of open source for IAM today.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.

Top 5 Critical Alerts You Need for IT Security
sponsored by ManageEngine
WHITE PAPER: Analyzing log data and identifying which security events are of concern among thousands of routine events can be a challenge, especially if you aren't sure which events to track. In this white paper, explore a list of 5 critical events your organization should be on the lookout for.
Posted: 13 May 2019 | Published: 13 May 2019

ManageEngine

Big Data Analytics - Security and Compliance Challenges in 2019
sponsored by comForte AG
WHITE PAPER: There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.
Posted: 13 May 2019 | Published: 30 Apr 2019

comForte AG

TechTarget Top Cloud Security Considerations for SAP Users
sponsored by Google
WHITE PAPER: Google Cloud helps SAP customers build, deploy and operate securely at internet scale. SAP users are currently looking to migrate from legacy SAP versions to the company's flagship S/4HANA platform, and do so in the cloud. Download this white paper now to see how Google Cloud addresses every security consideration that SAP users have to tackle.
Posted: 10 May 2019 | Published: 10 May 2019

Google
1 - 25 of 1250 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement