IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
26 - 50 of 1658 Matches Previous Page  |  Next Page
A Cloud Readiness Framework to Accelerate Your Cloud Transformation
sponsored by Cloud Spectator, LLC
WHITE PAPER: Read this whitepaper for an overview of the Cloud Readiness Framework and process that will allow your organization to ensure that you're prepared and ready to begin your cloud transformation, while ensuring critical gaps are addressed.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

Cloud Spectator, LLC

Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Use this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Radware

Human to Machines: The Shift in Security Strategy with Machine Learning
sponsored by Oracle
WHITE PAPER: Today's IT security strategy must evolve to focus on internal threats and securing what matters like customer data, financial data and business-critical applications. In this white paper, gain valuable insights into how machine learning brings a new level of sophistication to cybersecurity threat prediction, prevention, detection and response.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

If You Think Compliance is Expensive, Try Violations
sponsored by Oracle
WHITE PAPER: You don't need to be a victim of a cyberattack for your information systems to be on the wrong side of compliance regulations. Explore this white paper to discover how to prepare your sensitive data in the cloud for compliance regulations.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017

Radware

The Five Essential Capabilities Of An Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.
Posted: 02 Mar 2018 | Published: 02 Mar 2018

Splunk

Aggregate, Protect, Share: Technologies to Help Health IT Protect and Manage
sponsored by IBM
WHITE PAPER: Security breaches in healthcare organizations are climbing. Inside, discover why healthcare organizations must implement more comprehensive, integrated security solutions to stay compliant, and how using a single data protection infrastructure can protect data from security breaches.
Posted: 01 Mar 2018 | Published: 30 Nov 2017

IBM

How the Cloud Enables Digital Transformation
sponsored by Microsoft
WHITE PAPER: Download this white paper to discover how the cloud empowers organizations of all sizes to more effectively bring together people, data, and processes. See how the cloud can help your organization enhance communication, security, and productivity.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Microsoft

The Truth About Cloud Contact Center Security
sponsored by West UC
WHITE PAPER: For the modern contact center, security is still the biggest barrier to adoption of a cloud-based strategy. To ease your concerns, this white paper debunks 5 common network security myths and helps you build a secure cloud contact center.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

West UC

Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Nuix

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015

Nuix

3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER: In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018

Illusive Networks

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

Why a Unified Approach to IT and OT Network Security is Critical
sponsored by Skybox Security
WHITE PAPER: One of the biggest security challenges organizations are struggling with is limited visibility of the IT-OT attack surface. This white paper examines the challenges, implications and benefits of a unified approach to managing security in converged IT and OT networks.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Skybox Security

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

How to Secure Your Network from Ransomware
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the trends in ransomware, from what attackers are hoping to gain, to what it costs victims. Click inside to learn about a new approach to defending against this malware through cloud-based threat analysis.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Palo Alto Networks

Global De-Duplication for Encrypted Data
sponsored by Carbonite
WHITE PAPER: Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Carbonite

5 Critical Mistakes to Avoid When Evaluating a Next-Gen Firewall
sponsored by Palo Alto Networks
WHITE PAPER: Click inside to learn 5 common mistakes that occur when evaluating next-gen firewalls and how you can avoid them.
Posted: 16 Feb 2018 | Published: 31 Dec 2017

Palo Alto Networks

Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.
sponsored by Juniper Networks
WHITE PAPER: Inside this white paper, access your cybersecurity checklist to learn why traditional defenses are not working and how to prevent the increase of cybercrime in today's digital era.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

CrowdStrike

Unlock Business Opportunity without Taking Security Risks
sponsored by Juniper Networks
WHITE PAPER: This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

The Rise of Machine Learning in Cybersecurity
sponsored by CrowdStrike
WHITE PAPER: Today, the latest trend in cybersecurity is artificial intelligence, and specifically machine learning (ML). In this 31-page e-book, gain a detailed definition of ML and how you can successfully apply it to your security initiatives like malware detection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

CrowdStrike

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Monitoring Industrial Control Systems to Improve Operations and Security
sponsored by SecurityMatters
WHITE PAPER: Industrial Control Systems (ICS) sit at the core of every industrial process. This white paper details the pros and cons of several existing technologies that can be employed to monitor and protect ICS networks allowing organizations to best understand their environment and threat exposure throughout the entire security lifecycle.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

SecurityMatters
26 - 50 of 1658 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement