IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
51 - 75 of 1707 Matches Previous Page  |  Next Page
The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

The Time for Endpoint Unification is Here: A VDC Research Study
sponsored by VMware
WHITE PAPER: This white paper will explain how unified endpoint management platforms have evolved to become more flexible while enabling comprehensive support for both PC and mobile devices from a single console interface. It will also explain the challenges and barriers companies face as they modernize their end user computing environments.
Posted: 26 Jan 2018 | Published: 28 Dec 2017

VMware

4 Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: Reliable central logging or log management is the first critical step toward gaining visibility across a multi-layered security environment. This resource reveals how to gain immediate visibility into critical security incidents with 4 basic sources that security teams can leverage along with central logging.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

Automating GDPR Compliance for Network Monitoring and Security Infrastructure
sponsored by Big Switch Networks
WHITE PAPER: Is your network ready for May 25, 2018? Access this white paper to gain valuable insights into how to leverage Big Monitoring Fabric to reveal the benefits of network visibility for all monitoring and security tools, while simplifying and automating regulatory GDPR compliance.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Big Switch Networks

The General Data Protection Regulation: Key Themes and Challenges
sponsored by Forcepoint
WHITE PAPER: Read this white paper to explore 3 major misconceptions about the GDPR, and uncover 5 key steps to help your organization perform a basic assessment of its data protection capabilities. Then, discover an approach that can help you get in line with the GDPR in 3 core areas.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Forcepoint

Secure Cloud Collaboration without the Complication
sponsored by Citrix
WHITE PAPER: There are still some lingering doubts about the cloud's ability to maintain high security standards, but you can put them to rest. Read this white paper to learn how cloud-based collaboration tools are securing the apps, data, files, and services you depend on every day to provide a safe collaboration space for your employees.
Posted: 24 Jan 2018 | Published: 19 Dec 2017

Citrix

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 24 Jan 2018 | Published: 28 Sep 2017

SyncDog

Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM
sponsored by Splunk
WHITE PAPER: Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Splunk

5 Security Tips to Work on a Personal Device
sponsored by Citrix
WHITE PAPER: Mobility and personal devices are defining factors of the future workforce. Read this report for five tips to help you secure your personal device at work and minimize risk for yourself and your business. You will also see how employees act differently when using personal versus work devices, the importance of updating devices, and more.
Posted: 22 Jan 2018 | Published: 16 Nov 2017

Citrix

A WhiteHat Sentinel Product Family Overview
sponsored by Whitehat Securities
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

Whitehat Securities

Why Mobile Device Event Correlation Matters
sponsored by SyncDog
WHITE PAPER: A recent study by Gartner reveals 3 key challenges enterprises will deal with as more personal phones and tablets invade the workplace: governance and compliance, mobile device management, and security. Learn how to deal with these challenges head-first inside this white paper.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

SyncDog

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

The Essential Guide to Securing Remote Access
sponsored by Duo Security
WHITE PAPER: New threats center on gaining remote access to your apps and data – whether it's with stolen passwords or exploited known vulnerabilities targeting out-of-date devices. Access this resource to uncover the different threats, using real-world examples, and uncover security best practices to help your organization maintain secure remote access.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Market Guide for Mobile Threat Defense Solutions
sponsored by Lookout
WHITE PAPER: Download this market guide for mobile threat defense solutions to discover how they can protect your organization at the device, network and application level and compare vendors in the space.
Posted: 16 Jan 2018 | Published: 22 Aug 2017

Lookout

An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

Mobile Threat Report
sponsored by Lookout
WHITE PAPER: With mobile threats becoming increasingly sophisticated it's more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage. Download this white paper to uncover the latest mobile threats to your organization.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

Synopsys

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

The Developer's Guide to Software Integrity
sponsored by Synopsys
WHITE PAPER: Explore the importance of DevSecOps in building high-quality apps and learn which tools are best suited to helping developers identify and resolve the bugs that can lead to crashes or act as points of entry for attackers.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Synopsys
51 - 75 of 1707 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement