IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3136 Matches Previous Page  |  Next Page
Tackling the Visibility Gap in Information Security
sponsored by ReliaQuest
ANALYST REPORT: Read on to uncover the most tangible pain points in security management and the emerging mandate required from people, processes and technology to continue optimizing threat protection.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

ReliaQuest

Achieving Secure Authentication and Zero-Trust Security Without Agents or Proxies
sponsored by Silverfort
WEBCAST: Silverfort can enable organizations to enforce secure authentication – including MFA, adaptive authentication and zero trust – without deploying software agents or proxies. Tune into this webinar to learn more.
Posted: 15 Jul 2019 | Premiered: Jul 15, 2019

Silverfort

The Risk Initiative: Building a Business Case with Mitigation ROI
sponsored by Cyber-Ark Software
ANALYST REPORT: CyberArk launched a multi-part research project "The Risk Initiative: Building a Business Case with Mitigation ROI" which is designed to investigate how cybersecurity professionals can mature their programs to move towards ROI-centric decision-making. Download this research report to explore key findings.
Posted: 15 Jul 2019 | Published: 28 Feb 2019

Cyber-Ark Software

How to Design and Implement a GRC Framework for Enterprise Data Analytics
sponsored by Immuta, Inc
EBOOK: In this e-book, discover the organizational factors which must be considered in designing and implementing data policies and access control for analytic initiatives within an enterprise.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

Immuta, Inc

Data Protection by Design
sponsored by Immuta, Inc
WHITE PAPER: Data Protection by Design (DPbD) is the core data protection requirement introduced by the GDPR. And yet despite DPbD's centrality to the GDPR, it receives scant attention. Why? It's quite difficult to implement because it consists of many different requirements. In this white paper, explore what the DPbD is and why it's central to the GDPR.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

Immuta, Inc

5 Approaches to a Consistently Evolving Cybersecurity Program
sponsored by ReliaQuest
WHITE PAPER: When executed correctly, a consistently evolving security program can help manage costs and drive value beyond cybersecurity by delivering key strategic data analysis and insights to other departments. Read on to learn 5 approaches to a consistently evolving cybersecurity program
Posted: 12 Jul 2019 | Published: 12 Jul 2019

ReliaQuest

Top 5 Log Sources You Should be Ingesting but Probably Aren't
sponsored by ReliaQuest
WHITE PAPER: Logging and monitoring all relevant events from across the IT environment has ups and downs. Download this white paper for logging tips that can help save money and enhance security at your organization.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

ReliaQuest

Preparing for Personal Data Privacy Policies
sponsored by Micro Focus
EGUIDE: As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.
Posted: 12 Jul 2019 | Published: 10 Jul 2019

Micro Focus

Information Security Program Health Monitoring Guide
sponsored by ReliaQuest
WHITE PAPER: Health monitoring is an often-overlooked process that's critical to maintaining a secure environment. Learn how to address existing vulnerabilities, implement best practices and assess tool efficacy to protect your enterprise.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

ReliaQuest

Securing DevOps Environments in the Enterprise
sponsored by Cyber-Ark Software
WHITE PAPER: Download this white paper to learn about the importance of protecting the DevOps pipeline, common use cases, and essential principles of security policies and workflow management.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Cyber-Ark Software

Risk Assessment with Secure Content Management
sponsored by Micro Focus
WEBCAST: Tune into this webinar to learn how Micro Focus's Secure Content Management suite and its components help mitigate risk through the data assessment process.
Posted: 11 Jul 2019 | Premiered: Jul 11, 2019

Micro Focus

4 Cybersecurity Essentials that Your Board of Directors Wants to Know
sponsored by Cymulate
WHITE PAPER: In this white paper, discover the 4 insights Cymulate provides based on quantifiable metrics to help you explain your current cybersecurity posture, defensibility, priorities, and ROI in ways that are most meaningful to your executive audience.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Cymulate

How to Guide: Zero Trust Security Transformation
sponsored by Akamai Technologies
WHITE PAPER: The notion of a network perimeter can't be relied on in today's business landscape. A strategic security framework is needed. Download this guide to zero trust security for an understanding of what it is and why it's important for organizations to implement today.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Akamai Technologies

Ensure Privacy Protection Through Your Digital Transformation
sponsored by Micro Focus
WEBCAST: Today, the race to digital transformation is a vital one. However, as enterprises begin their digital transformation journey, they have to make privacy protection a top priority. In this webcast, Becky Arenson and Carole Murphy discuss how to minimize the risk of digital transformations with a unified technology framework.
Posted: 11 Jul 2019 | Premiered: Jul 11, 2019

Micro Focus

3 Steps to Securing Enterprise Data on Cloud Platforms
sponsored by ReliaQuest
WHITE PAPER: Enterprises have leveraged cloud platforms to facilitate web applications for years. However, many organizations that move to cloud platforms mistakenly assume that the cloud provider delivers sufficient visibility and monitoring. In this white paper, explore 3 steps that can help you properly secure your enterprise data on cloud platforms.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

ReliaQuest

What Makes a Standalone IPS so Effective?
sponsored by Trend Micro, Inc.
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 11 Jul 2019 | Published: 01 Mar 2019

Trend Micro, Inc.

The Cost of Credential Stuffing
sponsored by Akamai
ANALYST REPORT: Credential stuffing attacks can cause loss of customers and involvement of IT security that can result in an average cost of $1.2 million, according a Ponemon Institute survey. To gain a better understanding of the cost to prevent, detect and remediate credential stuffing attacks download this Ponemon Institute study.
Posted: 11 Jul 2019 | Published: 31 Oct 2018

Akamai

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning
sponsored by Cymulate
WHITE PAPER: Organizations of all shapes and sizes are fighting a war against threat actors. Currently, organizations use vulnerability scans and penetration tests to verify that their data is protected. However, a targeted attack simulation may be a better test for your organization. Download this white paper to learn more about targeted attack simulations.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Cymulate

CW ANZ: Trend Watch – Security
sponsored by ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 11 Jul 2019 | Published: 18 Jul 2019

ComputerWeekly.com

Securing Apache Kafka
sponsored by comForte AG
WHITE PAPER: There is often sensitive data passing through Apache Kafka, which needs to be secured. This could be PII, PANs, SSNs, health care records or any other sensitive value. Download this white paper for the main reasons to secure Apache Kafka and how it can benefit your business today.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

comForte AG

Understanding Data Privacy and CCPA
sponsored by Micro Focus
EGUIDE: In this e-guide, get a better understanding of data privacy through two expert articles about the intersection of marketing and data privacy as well as everything you need to know about the California Consumer Privacy Act.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Micro Focus

THE THREE PHASES OF SECURING PRIVILEGED ACCOUNTS
sponsored by Cyber-Ark Software
WHITE PAPER: In this white paper, discover the 3 phases of securing privileged accounts and which action may benefit an organization the most.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Cyber-Ark Software

Big Data Protection with Data-Centric Security
sponsored by Micro Focus
WHITE PAPER: Smart connected devices are everywhere, including billions of mobile devices carrying sensitive data in the hands of users across the globe. How safe is your data in light of today's modern threat landscape? Read on to learn more.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Micro Focus

From the Core to the Edge: 7 Reasons You Need Security at the Edge
sponsored by Akamai
WHITE PAPER: In this white paper, take a look at a security-at-the-edge approach and 7 reasons why it could help green light your digital business transformation.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Akamai

How the Global Law Firm Reduced Help Desk Tickets With Duo's MFA
sponsored by Ignition Technology Ltd
CASE STUDY: Withers Worldwide is a mid-sized law firm, and was experiencing inconsistencies with how employees logged into cloud and on-premises applications. Find out how they used Duo Access to streamline authentication with MFA and keep sensitive data safe in this case study.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Ignition Technology Ltd
1 - 25 of 3136 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement