Hardware  >  

Security Hardware

RSS Feed   
DEFINITION: Computer hardware that is designed to protect its contents from attack.
Security Hardware Reports
1 - 25 of 179 Matches Previous Page  |  Next Page
State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Security of Medical Technology Devices Solution Brief
sponsored by Cylance
PRODUCT LITERATURE: With 6,000 hospitals in the U.S. and five to 10 connected devices per hospital bed, medical technolgy devices are a large and attractive attack surface for cybercriminals, utilizing malware and ransomware. Learn more about how you can uniquely address the threats that medical technology devices face.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Cylance

The Value of a Secure Server Infrastructure
sponsored by Dell EMC
WHITE PAPER: In this analysis report, find out why your peers at other IT organizations are placing server security as a top concern. Based on interviews with over 300 IT professionals from server-heavy enterprises, this report sheds light on the concerns and purchasing priorities that are driving the latest infrastructure security trends.
Posted: 20 Aug 2018 | Published: 30 Apr 2018

Dell EMC

HSM Reimagined: Cloud Ready Encryption, Key Management and Tokenization as a Service
sponsored by Equinix
RESOURCE: More data in multi-cloud environments present increased security challenges, including the inability to obtain total control of encryption keys and data, malicious attacks and more. Learn how HSM as a Service provides cloud-ready encryption, key management and much more to help you stay protected.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Equinix

Security Analytics
sponsored by ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

ComputerWeekly.com

4 Tech Disruptors that Could Radically Change Security Operations
sponsored by SearchSecurity.com
EZINE: Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

SearchSecurity.com

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Webinar: Impact of Your Business Continuity Program on Cyber Resiliency
sponsored by IBM
WEBCAST: In this webinar, APAC Leader at IBM Mijee Briana Walker stresses the importance of establishing a business continuity management (BCM) program that proactively provides uptime in case of data breaches. Tune in for a proven, 3-pronged framework for BC, 10 areas your BCM should focus on, and more.
Posted: 09 Nov 2018 | Premiered: Nov 9, 2018

IBM

VxRail Cybersecurity Solutions Overview
sponsored by Dell EMC and VMware
PRODUCT OVERVIEW: Access this sheet for an overview of a resilient hyper-converged infrastructure option ideal for keeping virtualization environments secure. The system includes extensive levels of encryption to protect the confidentiality of data in use, in motion, and at rest; safeguard the entire data store, and protect VMs.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Dell EMC and VMware

4 Questions IT Leaders Need to Ask About Server Security
sponsored by Dell EMC and Intel®
RESOURCE: Successful IT Transformation begins with embedded end-to-end server security. In this infographic, you'll find 4 essential questions to ask to ensure that you partner with a security leader that will protect your servers from a malicious attack. Download now to learn more.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell EMC and Intel®

Using Hardware to Brace for Looming Security Threats
sponsored by Arrow Electronics
WHITE PAPER: As IT models become more abstract, it's almost impossible to draw a line in the sand to determine where the enterprise's true defensive perimeter lies. That's why many organizations are tapping into the most tangible aspect of their data center to deliver increased security features – the hardware. Find out how and why.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

Arrow Electronics

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Cloud Computing Top Threats
sponsored by HPE and Intel® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and Intel® Corporate

How to Prepare for a Cloud DDoS Attack on an Enterprise
sponsored by F5 Networks
EGUIDE: Learn the truth behind cloud DDoS attacks and how an enterprise that uses cloud services could protect itself against such a threat.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

A Closer Look at Cloud Migration Security Risks
sponsored by F5 Networks
EGUIDE: Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks
1 - 25 of 179 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement