IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 2988 Matches Previous Page  |  Next Page
Market Guide for Cloud Workload Protection Platforms
sponsored by VMware
RESEARCH CONTENT: Left uncontrolled, cloud environments inevitably spin into unmanageable complexity. This makes security difficult; however, organizations that want to manage this complexity can do so easily, if they use the correct cloud workload protection platform (CWPP). In this Gartner report, discover several key trends that are affecting the CWPP market.
Posted: 19 Apr 2019 | Published: 26 Mar 2018

VMware

TeamViewer Tensor Conditional Access
sponsored by TeamViewer
RESOURCE: Download this infographic to learn how a rule-based engine like a firewall can help you prevent unauthorized remote access and protect your corporate network.
Posted: 19 Apr 2019 | Published: 19 Apr 2019

TeamViewer

AxxonSoft Delivers FIFA World Cup* Security Platform Featuring Advanced Video Analytics and IntelĀ® Vision Products
sponsored by Intel
WHITE PAPER: Large-scale surveillance and security deployments bring unique technology challenges. Read this white paper about AI-powered security surveillance at the 2018 FIFA Cup to learn the extreme potential of artificial intelligence and deep learning and how to overcome its hurdles.
Posted: 19 Apr 2019 | Published: 31 Dec 2018

Intel

Dropbox Business Security
sponsored by Dropbox
WHITE PAPER: In this white paper, explore your collaboration platform options with Dropbox Business. Get an overview of Dropbox product features, and explore the security a Dropbox Business collaboration platform can offer your organization.
Posted: 18 Apr 2019 | Published: 31 Dec 2018

Dropbox

Employees Behaving Badly? Why Awareness Training Matters
sponsored by Mimecast
WHITE PAPER: Making awareness training part of your cyber-resilience planning is essential to keeping your organization secure. In general, employees are not doing bad things on purpose, but their actions can greatly impact the security of your organization and data. In this white paper, discover 6 ways to make security awareness a part of your culture.
Posted: 18 Apr 2019 | Published: 17 Oct 2018

Mimecast

Verizon Risk Report
sponsored by Verizon
RESOURCE: Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Verizon

Rethinking the Cyber Security of Consumer Internet of Things
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

ComputerWeekly.com

Office 365 Email Security and Resilience
sponsored by Mimecast
EBOOK: If your current email security doesn't fit your risk profile, consider a third-party platform. Download this guide to help you choose carefully among the many third-party platforms out there.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

Internal Threats Personified
sponsored by Mimecast
WHITE PAPER: When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

The Cost of Third-Party Cybersecurity Risk Management
sponsored by CyberGRX
RESEARCH CONTENT: Third-party breaches remain a dominant security challenge for organizations, with over 63% of breaches linked to a third party, according to the Ponemon Institute. In this report, find out more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

CyberGRX

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

How to Protect Your Business from a Magecart Data Skimming Attack
sponsored by Instart
WHITE PAPER: Data and credit card skimming attacks are especially worrying for online businesses. Skimming attacks have increased in scale and scope over the last decade, proving that these types of attacks continue to be a persistent security problem. In this white paper, learn why preventing data access is the only true defense against skimming attacks.
Posted: 16 Apr 2019 | Published: 30 Apr 2019

Instart

Simplify Network Transformation with Zscaler Cloud
sponsored by Zscaler
WHITE PAPER: Today's firewall options simply can't meet the requirements organizations need. Why? Download this e-book to learn more.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Zscaler

Best Practices for Implementing Security Awareness Training
sponsored by Mimecast
RESEARCH CONTENT: While technology-based solutions are critical for protecting an organization from attacks, a robust security awareness training program is also essential to provide a backstop. In this white paper, learn about the current state of security awareness training. Also learn about best practices to consider when developing a robust training program.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Mimecast

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

The State of Email Security
sponsored by Mimecast
EBOOK: In this e-book, The State of Email Security, take a closer look at the latest trends in impersonation attacks and ransomware to learn how you can strengthen your security defense strategy today.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Mimecast

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Moving to Microsoft Office 365 has many benefits such as ubiquitous data access and overall agility. But, moving email to this cloud environment can expose your organization to a wide range of security risks. In this white paper, learn what to look for in a third-party security platform to help your organization avoid these security challenges.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Mimecast

Autonomous Threat Hunting
sponsored by Verizon
WHITE PAPER: With Verizon's Autonomous Threat Hunting, you can transform massive amounts of system logs and threat data into high-quality, prioritized alerts. Download this white paper to learn more.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

Conversational Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: Although Microsoft has more control over Office 365 because it's hosted in their cloud, there are still gaps. There are risks. And these reside primarily in the areas of security, data assurance, continuity and backup/recovery. In this e-book, learn more about these risks and discover ways to mitigate them.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Mimecast

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by comForte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

Worldwide DDoS Prevention Solutions 2019 Vendor Assessment
sponsored by Neustar
RESEARCH CONTENT: Distributed denial-of-service (DDoS) attacks are increasingly complex, and they frequently employ multiple attack types and strategies. In this IDC MarketScape report, IDC compared 10 organizations that offer DDoS protection products and services. Read on to see which one is right for your organization today.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Neustar

PCI DSS as a Foundation
sponsored by comForte AG
WHITE PAPER: There are many risks to personal and cardholder data. However, the GDPR and PCI DSS provide a clear roadmap on how organizations can most effectively protect that data. In this white paper, learn how to take advantage of the overlap between GDPR and PCI DSS to improve your overall data security strategy.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

Introducing the Verizon Risk Report
sponsored by Verizon
RESEARCH CONTENT: This Verizon Risk Report uses daily threat cyber-risk intelligence from multiple sources allowing businesses to make data-driven security decisions and focus their security spending on where it will have the most impact.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

Why Enterprise Anti-Virus Isn't Working
sponsored by Ziften
RESOURCE: The name itself, anti-virus, betrays the inadequacy of the enterprise AV threat model. In this blog, learn more a new and improved next generation anti-virus (NGAV) which generally incorporates behavior analytics, cloud-based delivery, machine learning and artificial intelligence, and more automated response.
Posted: 15 Apr 2019 | Published: 09 Apr 2019

Ziften
1 - 25 of 2988 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement