Hardware  >  

Security Hardware

RSS Feed   
DEFINITION: Computer hardware that is designed to protect its contents from attack.
Security Hardware Reports
1 - 25 of 93 Matches Previous Page  |  Next Page
Revisiting Public Cloud Security
sponsored by Barracuda
WHITE PAPER: From a survey of 300 ITDMs, this report digs into the benefits and challenges of the public cloud and revisits several strategies to strengthen security. Read on to ensure your organization's public cloud security posture is in good standing.
Posted: 25 Apr 2019 | Published: 25 Apr 2019

Barracuda

Barracuda Cloud Security Guardian
sponsored by Barracuda
PRODUCT OVERVIEW: Barracuda's Cloud Security Guardian automatically optimizes and remediates security controls to ensure continuous compliance for workloads and apps hosted in the public cloud. To learn how your enterprise can benefit from automated cloud security measures, access it here.
Posted: 24 Apr 2019 | Published: 24 Apr 2019

Barracuda

Break the Link Between Users and Cyber Threats
sponsored by Avast Business
WHITE PAPER: Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Avast Business

How Much Does it Cost to Build a 24x7 SOC?
sponsored by Expel
WHITE PAPER: To say SOCs are costly is an understatement—they can range anywhere from $10,000 to more than $10 million. Download this white paper to review 4 SOC options and costs associated with them, as well as what they can do for your organization.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Expel

Authentication for Your Ever-Changing Needs
sponsored by Micro Focus
WHITE PAPER: In today's connected world, outsider threats are real and—at times—daunting. User credentials for access serve as an essential layer of defense. Learn about Micro Focus Advanced Authentication, which can enable secure interaction with employees, partners, and customers in this white paper.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Micro Focus

How To Secure IaaS/PaaS Effectively: Customer Responsibilities in the Shared Security Model
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

MASERGY

4 Server Security Must-Haves
sponsored by Dell EMC and Intel®
WHITE PAPER: Analysts have pinpointed firmware attacks as one of today's greatest system threats. Uncover four security features that server architecture should have to ensure your data center's most critical pieces of hardware are cyber-resilient and gap-free.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Dell EMC and Intel®

Transform Network Traffic into High-fidelity Logs for Analysis
sponsored by Corelight
PRODUCT OVERVIEW: Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Corelight

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Security of Medical Technology Devices Solution Brief
sponsored by Cylance
PRODUCT LITERATURE: With 6,000 hospitals in the U.S. and five to 10 connected devices per hospital bed, medical technolgy devices are a large and attractive attack surface for cybercriminals, utilizing malware and ransomware. Learn more about how you can uniquely address the threats that medical technology devices face.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Cylance

4 Questions IT Leaders Need to Ask About Server Security
sponsored by Dell EMC and Intel®
RESOURCE: Successful IT Transformation begins with embedded end-to-end server security. In this infographic, you'll find 4 essential questions to ask to ensure that you partner with a security leader that will protect your servers from a malicious attack. Download now to learn more.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell EMC and Intel®

Security Analytics
sponsored by ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

ComputerWeekly.com

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

How the Hybrid Cloud Changes the Game for Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Discover how to secure today's servers by examining the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Trend Micro, Inc.

Extending DLP to the Cloud
sponsored by InteliSecure
WHITE PAPER: Uncover how your organization can protect its data on the cloud through the use of data loss prevention (DLP).
Posted: 24 May 2017 | Published: 24 May 2017

InteliSecure

Why Conventional MSSPs are No Longer Sufficient
sponsored by InteliSecure
EGUIDE: Learn how traditional, legacy managed security services are no longer holding up in this new era of next gen MSSPs.
Posted: 23 May 2017 | Published: 23 May 2017

InteliSecure

4 Tech Disruptors that Could Radically Change Security Operations
sponsored by SearchSecurity.com
EZINE: Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

SearchSecurity.com

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.
1 - 25 of 93 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement