IT Management  >   Systems Operations  >  


RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by, powered by an online computer dictionary
Security White Papers (View All Report Types)
101 - 125 of 1708 Matches Previous Page  |  Next Page
The Developers Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the top app security challenges for DevOps methodologies and find out how to bolster app development with best practices for DevSecOps.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is the most disruptive trend affecting secure development today. This resource provides you with the importance of securing DevOps and everything to know when adopting a DevOps approach.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

Security Comparison: MDR, MSSP, and SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Gain valuable insights into the pros and cons of MDR, MSSP and SIEM to help build your cybersecurity protection protocols against today's threats – and tomorrow's.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

PCI DSS Compliance: Best Practice Checklist
sponsored by Semafone
WHITE PAPER: With a multitude of systems, people, and processes within the call center, securing sensitive customer data has become increasingly challenging, and this is why the PCI DSS regulation was implemented. Explore this resource to uncover a PCI DSS checklist to gauge your compliance readiness.
Posted: 05 Jan 2018 | Published: 05 Jan 2018


SIEM For Beginners: Everything to Know about Log Management
sponsored by AlienVault
WHITE PAPER: The more valid information depicting your network, systems, and behavior the SIEM has the more effective it will be in helping improve your security operations.This resource provides insight into the basics of log management and how improving your SIEM can boost your security posture.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


DTMF Masking for PCI DSS Compliance
sponsored by Semafone
WHITE PAPER: PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017


Atos Workplace Mobility Factsheet
sponsored by Atos
WHITE PAPER: Discover a mobile device lifecycle management service that takes pressure off your IT team, prevents shadow IT from creeping into your organization, and leaves you in control of your devices.
Posted: 20 Dec 2017 | Published: 25 Oct 2017


Digital Transformation Starts Here
sponsored by AdvizeX Technologies
WHITE PAPER: Roughly half of businesses don't know what their industry will look in three years, and 45% of businesses are worried about becoming obsolete over the next three to five years. Find out which three aspects of your IT department need to be transformed to keep your organization alive during the tumult of the next five years.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

AdvizeX Technologies

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: Discover the 10 network security tools and tests that you should consider implementing and know how to use.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Global Knowledge

Primer for Protection Against Cyberattacks: Business Email Compromise
sponsored by TrendMicro
WHITE PAPER: In this primer, learn how business email compromise (BEC) attacks make inroads to businesses of all sizes. Then explore some strategies on how you can avoid becoming a victim of this scam.
Posted: 30 Nov 2017 | Published: 30 Nov 2017


Top 3 Challenges Your Team Faces when Building in the Cloud
sponsored by TrendMicro
WHITE PAPER: In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.
Posted: 30 Nov 2017 | Published: 30 Nov 2017


10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 30 Nov 2017 | Published: 20 Nov 2017


Enterprise Mobility Roadmap
sponsored by VMware
WHITE PAPER: Download this roadmap for 5 essential steps to future-proofing your mobility strategy. You'll learn how unified and cloud-based platforms, analytics and security infrastructures can drive visibility in device usage and policies to protect your organization – while allowing employees the flexibility they demand.
Posted: 29 Nov 2017 | Published: 29 Nov 2017


Servers, Servers, Everywhere: How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: With the vast shift to the cloud, securing workloads in multiple locations has become more complex than ever before. Access this white paper to gain valuable insights into the security challenges of the hybrid cloud and how you can overcome these challenges.
Posted: 29 Nov 2017 | Published: 31 Mar 2017


Check Point and Silver Peak Securing the Internet for SD-WAN
sponsored by Silver Peak
WHITE PAPER: Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.
Posted: 28 Nov 2017 | Published: 31 Dec 2016

Silver Peak

IP Surveillance Solutions that Connect Businesses to More Peace of Mind
sponsored by D-Link
WHITE PAPER: In this solution brief, learn how to make the transition to IP surveillance and how network switches ease integration. Then, uncover the benefits of IP surveillance cameras including improved image quality and reliability.
Posted: 20 Nov 2017 | Published: 20 Nov 2017


The Top 4 Myths of Network Security and Compliance
sponsored by FireMon
WHITE PAPER: Each year, fraudulent activity accounts for $600 billion in losses in the United States. Explore this resource to gain insight into policy regulations and how to secure your data while maintaining regulatory compliance.
Posted: 08 Jan 2018 | Published: 08 Jan 2018


Recommendations for Secure Policy Configuration Assessment
sponsored by FireMon
WHITE PAPER: According to Gartner, secure configuration assessment is essential for identifying risks arising out of weak and misconfigured systems and devices. This resource offers strategies for achieving Gartner's 4 recommendations for secure policy configuration assessment.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


The Top 5 Requirements to Look for in Your Network Security Policy Management Solution
sponsored by FireMon
WHITE PAPER: In the last 20 years, network security policies have grown by more than 3,500%, according to FireMon.This resource examines the top 5 requirements to look for in your networking security policy management strategy.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


Anti-Bribery and Corruption Risk Assessment Checklist
sponsored by Navex Global
WHITE PAPER: This Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance program using a methodology of protecting, detecting and correcting to manage core program components.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Navex Global

GDPR Compliance: How to Comply with 3 Key Articles
sponsored by Rapid7
WHITE PAPER: While it will take a collection of services and tools to get into full compliance with the new General Data Protection Regulation (GDPR), security is a key piece. In this white paper, learn about a service which can help you prepare to meet 3 of the GDPR's articles so that you are ready to face this new law on every level of your IT environment.
Posted: 28 Nov 2017 | Published: 28 Nov 2017


Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER: In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017


What You Need to Know About the General Data Protection Regulation (GDPR)
sponsored by Rapid7
WHITE PAPER: In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

101 - 125 of 1708 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement