IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3425 Matches Previous Page  |  Next Page
Exposing the Top Ten Cloud Security Myths
sponsored by Palo Alto Networks
RESOURCE: Regardless of where your company is on its cloud journey, security challenges remain, with cyberattacks becoming more complex. Constantly evolving threats & innovations are requiring IT leaders to re-evaluate their cloud security strategies. Dive into this article to uncover the 10 biggest security myths about cloud computing.
Posted: 13 Nov 2019 | Published: 31 Jan 2019

Palo Alto Networks

Protecting Data Capital in Your Organization
sponsored by Dell EMC
WHITE PAPER: With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Dell EMC

Simplify, Strengthen & Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructureIn this data sheet, uncover the benefits & challenges of incorporating a zero-trust approach & gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Leveraging a Smart Lighting System to Enter a Building Network
sponsored by Forescout
RESOURCE: Although smart lighting systems increase energy efficiency, improve working conditions and optimize space utilization in a building, their connection to the internet provides a potential network entry point for malicious actors. Download this infographic to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Video Surveillance System (VSS) Architecture in a Smart Building
sponsored by Forescout
RESOURCE: Today, many buildings have a hybrid VSS architecture that is quite complex, containing a variety of legacy and new systems, including both analog and IP cameras. The problem is that this architecture presents many vulnerabilities. In this infographic, explore some common vulnerabilities found in many VSS commonly used in large organizations.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential & password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Asia-Pacific Cloud Security Study
sponsored by Palo Alto Networks
WHITE PAPER: A recently released study by Palo Alto Networks uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific, including many cases where perception doesn’t match the reality of professionals who know best. Download the report to dive deeper into the research.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Palo Alto Networks

How to Use Evaluation Factors to Select the Best Microsegmentation Model
sponsored by ShieldX
ANALYST REPORT: Security and risk management leaders deploying microsegmentation face difficult technical choices, which can be facilitated by Gartner's 4 microsegmentation models. Download Gartner’s research to select which of the 4 models is best suited to your enterprises' needs.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

ShieldX

Endpoint Security Buyer’s Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Endpoints are critical to protect, as they are the most common areas for cyberattacks & breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities & identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Tanium

How to Lock Down Git
sponsored by Perforce
WHITE PAPER: While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Perforce

Best practices for secure cloud migration
sponsored by Thales
WHITE PAPER: The Cloud Security Alliance (CSA) is an organization whose mission is to promote best practices & provide education for cloud security. Recently, the CSA released a guide that covered best practices, key considerations & use cases. Is your organization considering adoption of cloud services? Read on to enhance your understanding.
Posted: 11 Nov 2019 | Published: 30 Jun 2019

Thales

The Future of Network Security Is in the Cloud
sponsored by Apcela
ANALYST REPORT: Network and network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift.
Posted: 11 Nov 2019 | Published: 30 Aug 2019

Apcela

CW APAC - November 2019: Expert advice on container security
sponsored by ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

ComputerWeekly.com

Top Security Playbooks for 2019
sponsored by Siemplify
WHITE PAPER: The security operations center (SOC) is critical to the securing business operations by investigating and negating security incidents. Playbooks assist SOC teams by providing a sequential response process that is both repeatable & targeted at specific incidents. Download this whitepaper to discover the top security playbooks for 2019.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Siemplify

Aeris ConnectionLock: Restricting Device Communications to Select Destinations
sponsored by Aeris
PRODUCT OVERVIEW: Without any network restrictions in place, IoT devices can send data to or receive data from any unintended destination. This increases the risk of application data getting compromised. In this brief, learn about The Aeris Intelligent IoT Network which can help your organization restrict data delivery to only designated IP addresses or endpoints.
Posted: 08 Nov 2019 | Published: 31 May 2019

Aeris

CyberArk Privileged Access Security
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities an organization faces today. In this CyberArk white paper, discover the industry’s most complete solution to reduce risk created by privileged credentials.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Cyber-Ark Software

2019 Cybersecurity Trends
sponsored by Cisco Umbrella
RESOURCE: In this research summary of 2019’s cybersecurity trends, discover the challenges, best practices, market trends & prominent threats as they relate to today’s increasingly distributed enterprises. Continue to this report to learn more.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Cisco Umbrella

Managing Risk in the Digital Era
sponsored by Cyber-Ark Software
WHITE PAPER: It’s no secret that businesses must embed cybersecurity into their digital transformation programs to help mitigate threats and manage risk. In this white paper, CISOs reveal their digital transformation secrets to success when managing risk in the digital era.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Cyber-Ark Software

Managed Security Service Provider (MSSP) Buyer’s Guide
sponsored by Siemplify
WHITE PAPER: This guide aims to outline the challenges faced by MSSPs and gives criteria to consider when evaluating a SOAR solution. It also provides direction regarding the implementation of SOAR in a MSSP. Read on to learn more.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Siemplify

The Business Case for SOAR
sponsored by Siemplify
WHITE PAPER: Security orchestration, automation and response (SOAR) platforms are rapidly becoming a must-have solution for SOC teams to enable more effective and efficient detection, triage, investigation and remediation of threats. This resource details the various ways SOAR solutions can save security operations organizations millions. Read on to learn more.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Siemplify

Securing the Enterprise’s Cloud Workloads on Microsoft Azure
sponsored by Cyber-Ark Software
WHITE PAPER: Download this white paper to learn how CyberArk Privileged Access Security can be used to proactively protect privileged access in Microsoft Azure cloud environments.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Cyber-Ark Software

Cisco 2018 Annual Cybersecurity Report
sponsored by Cisco Umbrella
EBOOK: The Cisco 2018 Annual Cybersecurity Report for Cloud Security examines the techniques and strategies that adversaries use to break through defenses and evade detection. Get the at-a-glance report for cloud security.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Cisco Umbrella

RPA Security Best Practices
sponsored by CyberArk Software, Inc
WEBCAST: Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

CyberArk Software, Inc

Microsoft Vulnerabilities Report 2019
sponsored by BeyondTrust Corporation
WHITE PAPER: The 2019 Microsoft Vulnerabilities Report compiles every Microsoft security bulletin from 2018, analyzes the trends, and includes viewpoints from security experts. Read on to get started.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

BeyondTrust Corporation
1 - 25 of 3425 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement