IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
126 - 150 of 1709 Matches Previous Page  |  Next Page
The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID Global
WHITE PAPER: According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals 5 FAQs to help banking organizations make smart decisions when evaluating mobile banking security.
Posted: 20 Oct 2017 | Published: 31 Dec 2016

HID Global

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

The Perfect Rx for HIPAA Compliance
sponsored by AlienVault
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

Symantec™ Cloud Generation Malware Analysis
sponsored by Symantec
WHITE PAPER: Hackers continue to show endless ingenuity in penetrating corporate networks with malware, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about defeating malware.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Mobile Malware in the UK
sponsored by Lookout
WHITE PAPER: The average malware infection on a mobile device costs £6,400. With the rise of employees using mobile devices for work, companies need to be aware of the high cost and vulnerability of malware attacks. This white paper offers a malware case study to help organizations fight back against mobile threats.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Endpoint Security - Market Quadrant 2016
sponsored by Symantec
WHITE PAPER: By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.
Posted: 11 Oct 2017 | Published: 30 Nov 2016

Symantec

Amazon Web Services: Risk and Compliance
sponsored by AWS
WHITE PAPER: Key into this white paper to explore a basic approach to evaluating AWS controls as well as AWS-specific information around general cloud computing compliance questions.
Posted: 11 Oct 2017 | Published: 31 May 2017

AWS

AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services

Overview of AWS Security - Network Security
sponsored by Amazon Web Services
WHITE PAPER: Explore this white paper to learn more about AWS cloud monitoring tools designed to protect your network architecture from threats like DDoS attacks, IP spoofing, and more.
Posted: 10 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.
Posted: 09 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Overview of AWS Security - Analytics Services, Mobile and Applications Services
sponsored by Amazon Web Services
WHITE PAPER: Cloud-based analytics services can help your organization process and analyze any volume of data. Download this resource to learn how your organization can benefit from a variety of cloud based analytics and mobile application services, ranging from identity and access management to mobile analytics, and deployment and management services.
Posted: 09 Oct 2017 | Published: 01 Jun 2016

Amazon Web Services

Overview of AWS Security: Compute Services
sponsored by Amazon Web Services
WHITE PAPER: AWS has focused on building security into every layer of their infrastructure, as well as each available service. Access this white paper for an overview of the security AWS provides for their services and how they provide extensive security features to enable you to protect sensitive data and applications.
Posted: 09 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Overview of AWS Security: Database Services
sponsored by Amazon Web Services
WHITE PAPER: While the cloud has improved security overall, AWS, aware that it is a large target for cyberattackers hunting for data, has stepped up to the challenge. This white paper gives you an overview of the database security services that AWS provides.
Posted: 09 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Security at Scale: Governance in AWS
sponsored by Amazon Web Services
WHITE PAPER: Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.
Posted: 09 Oct 2017 | Published: 30 Oct 2015

Amazon Web Services

SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

PCI Compliance with Unified Security Management
sponsored by AlienVault
WHITE PAPER: Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

Complying with GDPR: What All Organizations Need to Know
sponsored by Absolute
WHITE PAPER: With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Absolute

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault
126 - 150 of 1709 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement