IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
1 - 25 of 1349 Matches Previous Page  |  Next Page
Comprehensive Security for Your Applications
sponsored by VMware
WHITE PAPER: Despite cybersecurity being a top priority, organizations continue to fall short protecting against threats. In this white paper, learn how VMware can help your organization to architect security into your infrastructure to better secure your applications and data.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

VMware

How Confident Are You That You Have Total Asset Visibility?
sponsored by BT
WHITE PAPER: WannaCry underlined the fact that, where network discovery is concerned, some visibility is effectively no visibility. Find out how you can get total asset visibility—and why it's so important—in this brief white paper.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

BT

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

AI: The Perfect Partner for the Future of Cyber Defense
sponsored by BT
WHITE PAPER: Read this white paper to learn how to encourage a collaborative effort between machine learning capabilities and human decision-making—specifically with cyber defense.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

BT

How to Automate API Security
sponsored by Data Theorem
WHITE PAPER: As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Data Theorem

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Rethinking Third-party Cyber Risk Management
sponsored by CyberGRX
WHITE PAPER: In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Countering Evasive Threats With Moving Target Defense
sponsored by Morphisec, Inc.
WHITE PAPER: Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Ramp Up Security and Productivity with Cloud MFA & SSO
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, learn about a cloud identity and access management (IAM) solution that cost-effectively mitigates password security and access control concerns, improves user productivity, and is simple enough for generalists to integrate and manage.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Ping Identity Corporation

6 Ways to Make Your Security Stack Work Harder
sponsored by Cisco Umbrella
WHITE PAPER: The average company uses more than 50 security vendors. And sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. In this white paper, check out 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Cisco Umbrella

Using MITRE ATT&CK in Threat Hunting and Detection
sponsored by LogRhythm, Inc.
WHITE PAPER: ATT&CK can be used in many different ways to improve cybersecurity efforts. This white paper focuses on how you can use ATT&CK to enhance, analyze and test your threat detection efforts. Download this white paper to learn how you can ensure comprehensive, up-to-date, and verifiable threat detection.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

LogRhythm, Inc.

Adobe Document Cloud for Sales
sponsored by Adobe Systems Incorporated
WHITE PAPER: What does your organization know about your potential vendor's e-signature security features? In this white paper, discover 4 pertinent security questions you should be asking potential e-signature vendors, and learn how e-signature technology can help your organization achieve digital transformation.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Adobe Systems Incorporated

How the Unity EdgeConnect SD-WAN Edge Platform Supports PCI DSS Compliance
sponsored by Silver Peak
WHITE PAPER: According to the latest Nilson Report, worldwide payment card fraud losses reached $24.3 B in 2018 and are expected to exceed $34 B by 2022. Read this white paper to learn how Silver Peak's SD-WAN can help keep you safe and comply with most PCI DSS requirements.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Silver Peak

3 Steps to Managing Shadow IT
sponsored by Cisco Umbrella
WHITE PAPER: In today's digital workplace, organizations, departments, and individual users are embracing the cloud and leveraging new apps at rapid speed. This makes it difficult for security leaders to track app use and ensure that proper protections are in place. In this white paper, uncover 3 steps to managing shadow IT.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

You Need to See It to Protect It: How Real-Time Visibility and IT Hygiene Drive AWS EC2 Security
sponsored by Amazon Web Services
WHITE PAPER: Organizations are increasingly connecting mission-critical apps and data to AWS and taking advantage of its scalable Elastic Compute Cloud (EC2). But, managing and securing your own EC2 environment can become a challenge. In this white paper, learn how real-time visibility and good IT hygiene can drive AWS EC2 security.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Amazon Web Services

Trend Report: Employees Like to Use Unsanctioned Apps — and Don't Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

How to Test Your Security Effectiveness
sponsored by Verodin
WHITE PAPER: Download this white paper to learn about the Verodin Security Instrumentation Platform (SIP)—which uses a signal to continuously validate the layered defenses in your infrastructure to ensure they're optimally configured and working as expected.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Verodin

Remove Assumptions, Prove Security
sponsored by Verodin
WHITE PAPER: With no visibility into their cybersecurity effectiveness beyond a point in time, organizations have grown accustomed to holding a reactionary stance when managing their cybersecurity risks. Learn about Verodin SIP, an evidence based approach to managing your cybersecurity lifecycle.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Verodin

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

How the Gigamon Insight Solution Can Help Secure Medical Devices
sponsored by Gigamon
WHITE PAPER: As the number of medical devices being used in HDOs' networks increase, so too does the number of targets for threat actors. In this white paper, learn about a passive network security monitoring solution and how it cover the existing medical devices in an HDO's network, but also any new devices that are placed onto the network.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Defending the Digital Enterprise
sponsored by Gigamon
WHITE PAPER: Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Making Application & Infrastructure Vulnerability Management More Effective
sponsored by ZeroNorth
WHITE PAPER: Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

ZeroNorth

Will the GDPR Affect Your Organization?
sponsored by SAP
WHITE PAPER: In this brief white paper, explore how SAP Business ByDesign can help your organization maintain GDPR compliance. Review Business ByDesign product features and benefits, and decide if SAP Business ByDesign is right for your organization.
Posted: 05 Sep 2019 | Published: 31 Dec 2017

SAP

How Security Can Fuel Innovation
sponsored by ZeroNorth
WHITE PAPER: This white paper discusses how, by shifting security left in the development process for true DevSecOps, it's now no longer an obstacle to DevOps innovation, velocity and competitiveness. Instead, it's an asset. Read on to learn how.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

ZeroNorth

Privileged Access Management in the Modern Threatscape
sponsored by Centrify Corporation
WHITE PAPER: Privileged access remains the preferred vector for attackers, and most organizations aren't taking the very basic steps to secure it. Dive into this 2019 Centrify Privileged Access Management Survey to learn about their findings for securing the modern threatscape with zero trust privilege.
Posted: 04 Sep 2019 | Published: 19 Feb 2019

Centrify Corporation
1 - 25 of 1349 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement