IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3158 Matches Previous Page  |  Next Page
Responding to a Pandemic
sponsored by ActivTrak
WHITE PAPER: As organizations require employees to work from home on a more massive scale, it's important to recognize that doing so also introduces certain risks to the business that must be mitigated. This article covers three remote workforce-related risks: employee productivity, digital security, and compliance.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

ActivTrak

Security of Public Cloud Instances Is Your Problem, So Deal With It
sponsored by Kaspersky Lab
WHITE PAPER: This white paper is designed to arm InfoSec Specialists with the information and evidence needed to ensure that Cloud Workload Security, i.e. the security of the Operating System that the workload is running, is treated as a fundamental consideration in cloud deployment scenarios.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Kaspersky Lab

Next-Gen Intrusion Detection: Complementing Perimeter Protection to Secure the Virtual Attack Surface
sponsored by Accedian
WHITE PAPER: Learn about next-gen IDS technology and how it adds another layer of protection to the enterprise SecOps arsenal to not only protect against illicit network intrusions and behaviors, but to implement active measures to catch cybercriminals in the act.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Accedian

Magic Quadrant for Access Management
sponsored by Ping Identity Corporation
ANALYST REPORT: Dive into this Gartner Magic Quadrant for Access Management to see how different vendors in the space stack up.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Ping Identity Corporation

Audit Preparation Checklist: What Compliance Auditors Want to See
sponsored by Ostendio
EGUIDE: Think your enterprise is ready for its audit? Check off key points in this audit preparation checklist to ensure it has all the resources needed to help auditors do their job.
Posted: 07 Apr 2020 | Published: 06 Apr 2020

Ostendio

Making the Case for Integrated Risk Management
sponsored by Ostendio
EGUIDE: View this e-guide where security experts discuss how an integrated approach to risk and governance can be effectively managed.
Posted: 07 Apr 2020 | Published: 03 Apr 2020

Ostendio

Extending Secure Access to Remote Workers
sponsored by Barracuda
WEBCAST: These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
Posted: 07 Apr 2020 | Premiered: Apr 7, 2020

Barracuda

HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
sponsored by Ostendio
EGUIDE: Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ostendio

Augmenting Native Cloud Service Provider Security
sponsored by DivvyCloud
WHITE PAPER: What do organizations need to do to augment or boost their current cloud security approach to better manage breach risk at an acceptable level in the cloud? Download this white paper to find out.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

DivvyCloud

Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey
sponsored by Gigamon
ANALYST REPORT: A new survey out from SANS provides leading factors that impact cybersecurity pros and how they spend cybersecurity dollars. Read the survey today to learn from the experts how to make your cybersecurity spend smarter.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Gigamon

Access Policy Manager
sponsored by F5 Networks
DATA SHEET: Download this overview to learn about all the benefits of F5’s Access Policy Manager (APM).
Posted: 06 Apr 2020 | Published: 06 Apr 2020

F5 Networks

5 Ways to Boost Productivity by Transforming Workforce Identity
sponsored by Ping Identity Corporation
RESOURCE: Learn how workforce identity security helps you champion digital transformation by driving efficiencies and productivity across your business.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ping Identity Corporation

5 Ways to Boost Security by Transforming Workforce Identity
sponsored by Ping Identity Corporation
RESOURCE: Learn 5 ways to boost security by transforming workforce identity today.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ping Identity Corporation

Preparing for a Pandemic
sponsored by ActivTrak
WHITE PAPER: Uncover three remote workforce-related risks organizations should mitigate during the time of this pandemic: employee productivity, digital security, and compliance.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

ActivTrak

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 06 Apr 2020 | Published: 07 Apr 2020

ComputerWeekly.com

Global Partners
sponsored by TITUS
WHITE PAPER: To bring best-of-breed data classification solutions to enterprise customers across the globe, Titus relies on partnerships with recognized security technology companies as well as solution providers in every region. Download this white paper to learn more about Titus’s global partners.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

TITUS

Microsoft 365 Business Premium Secures Your Devices
sponsored by TechData - Microsoft
VIDEO: In this short and comical video, learn how Microsoft Office 365 can help secure all your devices.
Posted: 03 Apr 2020 | Premiered: 03 Apr 2020

TechData - Microsoft

The Comprehensive 1-minute IT Audit
sponsored by TechData - Microsoft
VIDEO: In this short and comical video, learn about Microsoft 365 Business Premium and how it can help SMB security needs.
Posted: 03 Apr 2020 | Premiered: 03 Apr 2020

TechData - Microsoft

How DivvyCloud Enables Continuous Multi-Cloud Security and Compliance Best Practices for CoStar During Mergers and Acquisitions
sponsored by DivvyCloud
CASE STUDY: CoStar, the leading provider of commercial real estate information, analytics, and online marketplaces needed to ensure security and compliance of their cloud footprint. Learn how DivvyCloud provides CoStar with control over their cloud resources in a way that supports their business model and culture.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Guide to Remote Workforce Management: Trends, Tips and Tactics
sponsored by ActivTrak
WHITE PAPER: Inside this guide, find trends, tips, and tactics on how to keep pace with the shift towards remote working.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

ActivTrak

Big-IP Access Policy Manager
sponsored by F5 Networks
WHITE PAPER: Learn how F5 Big-IP Access Policy Manager delivers unified global access control for your users, devices, applications, and APIs.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

F5 Networks

Business Continuity
sponsored by PortSys
RESOURCE: Many organizations prior to COVID-19 had business continuity plans in place. But were counting on VPNs and VDIs, which happen to be among the most frequently targeted attack vectors by hackers. In this blog post from PortSys, get an in-depth overview of today’s security challenges with VPNs.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

PortSys

Third-Party Security Controls Needed to Close Gaps in Native Email Security
sponsored by Armorblox
ANALYST REPORT: With the move to cloud-delivered email solutions and an expanding email threat landscape, email security is in a state of transformation and organizations are reconsidering their current email security controls. Tap into this ESG report to learn what 403 IT and security professionals have to say about their email security concerns.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

Trends in Email Security
sponsored by Armorblox
RESEARCH CONTENT: In order to gain insight into email security trends, ESG surveyed 403 IT and cybersecurity professionals responsible for evaluating, purchasing, and managing email security products, processes, and services. Download this survey report to uncover the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

WhiteHat Security 2020 Predictions
sponsored by WhiteHat Security
WHITE PAPER: In 2019, there were 15.1 billion breached records total. 12,174 new vulnerabilities were found in commercial and open source software. Will 2020 have the same numbers? In this report, learn about the state of application security, from the new Chief Application Security Officers to shifts in data privacy and IT security training.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

WhiteHat Security
1 - 25 of 3158 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info