IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3317 Matches Previous Page  |  Next Page
Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day
sponsored by Datto, Inc.
EBOOK: Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

5 Best Practices in Cloud Security for Legal
sponsored by ShieldX
WHITE PAPER: Everyone is moving to the cloud. But unfortunately, cloud adoption is moving too fast for security to keep up. This e-book outlines a series of best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud. Read on for 5 best practices these customers have shared.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ShieldX

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

Accelerate Cloud App Adoption without Compromising Security
sponsored by Forcepoint
WEBCAST: In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services? Tune into this webinar to find out.
Posted: 14 Oct 2019 | Premiered: Oct 14, 2019

Forcepoint

Unified Data Protection for Hybrid IT, Part 2
sponsored by Forcepoint
WEBCAST: In part two of the Unified Data Protection for a Hybrid IT World webinar series, take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint can help you meet your data protection needs.
Posted: 14 Oct 2019 | Premiered: Oct 14, 2019

Forcepoint

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
EBOOK: The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Rethinking Security for Digital Transformation
sponsored by ZeroNorth
WHITE PAPER: As software becomes more critical to every business, understanding risk that may exists gains increasing importance. Download this report to learn how organizations currently tackle security in the context of digital transformation—and where these initiatives may go in the future.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ZeroNorth

Morphisec 2019 Hospitality Guest Cybersecurity Threat Index
sponsored by Morphisec, Inc.
ANALYST REPORT: As Morphisec continues to assist hospitality providers with improving defenses and protecting customer financial data and personal information, they decided to examine how the threat of cyberattacks is impacting the mindset of consumers. Download Morphisec’s 2019 Hospitality Guest Cybersecurity Threat Index report to see what they found.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Morphisec, Inc.

RMM & Patch Management: The First Line of Defense Against Cyber Threats
sponsored by Datto, Inc.
WHITE PAPER: Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

An Analysis of the Market for Data Loss Prevention Vendors
sponsored by Forcepoint
ANALYST REPORT: Tap into this analysis of the market for data loss prevention solutions that reveals top players, trail blazers, specialists and mature players.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Avoiding APTs: Defending your Critical Infrastructure
sponsored by Panda Security
WHITE PAPER: Cybersecurity technology is constantly innovating to stay ahead of the latest threats, including APTs. In this e-book, learn about APTs, the impacts they can have on critical infrastructure and ways you can proactively protect your organization.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Panda Security

Observations From the Front Lines of Threat Hunting
sponsored by Crowdstrike
WHITE PAPER: This mid-year report provides a summary of OverWatch’s threat hunting findings from the first half of 2019. Download now to review intrusion trends during that time frame, insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.
Posted: 11 Oct 2019 | Published: 11 Oct 2019


The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Business Expansion and Sales Tax Nexus
sponsored by Avalara
WHITE PAPER: Planting your company flag in fertile new ground is one way to expand your business. But it can also bring up a crop of new compliance issues. This white paper will help you prepare for dealing with new tax requirements that spring up from growth.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avalara

Cybercrime The New Downtime Threat to SMBs
sponsored by Avast Software
RESOURCE: A growing number of small to medium-sized businesses are falling victim to cybercrime. However, not all SMBs are aware of the risks and implications. In this infographic, learn why SMBs need a proactive security strategy that includes services that protect data, devices and people to eliminate gaps in protection.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avast Software

AntiVirus for Mobile vs. Managed Secure Access for Mobile and BYOD
sponsored by PortSys
RESOURCE: Antivirus is a great technology for helping to protect devices. But how does antivirus protection differ from say, managed secure access when it comes to mobile devices? Download and discover the answers in fewer than four minutes with this revealing blog post.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services
sponsored by Avast Software
WHITE PAPER: Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.
Posted: 11 Oct 2019 | Published: 31 May 2019

Avast Software

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

All Access Is Not Created Equal
sponsored by PortSys
RESOURCE: “Context of Access” involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

IT Security is Broken Can Zero Trust Access Fix It?”
sponsored by PortSys
RESOURCE: Which well-known medical collection agency has filed for bankruptcy as a result of a security breach affecting 20 million consumers? Which popular hotel chain faced a $124 million fine for violating GDPR? Find out the top security challenges (and the painful costs) that are affecting so many companies today.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

Sharpen your Focus on Spear Phishing Attacks in 2019
sponsored by PortSys
RESOURCE: How can you ensure you don’t end up being skewered by a spear phishing attack? Stronger identity management with multiple factors of authentication? Biometrics? How about Context of Access? Find out the facts in this revealing overview from security pundit Michael Oldham, CEO of PortSys.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

Detect On-Prem Privileged Account Risk and Vulnerabilities with Cyberark Zbang
sponsored by CyberArk Software, Inc
DATA SHEET: In this brief, learn about the capabilities of the CyberArk zBang tool and how it creates an in-depth risk assessment that automates and unifies manual scans that uncover privileged access security risk across on-premises environments.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

CyberArk Software, Inc

3 Essential Components of a Managed Security Service for SMBs
sponsored by Avast Software
WHITE PAPER: This white paper examines the current attack surface for SMBs and looks at the 3 essential components of a managed security service, which include protection for data, devices, and people. Read on to learn more.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Avast Software

Assessing the Security and Compliance Posture of an AWS Account and Its Assets
sponsored by CloudPassage
VIDEO: CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.
Posted: 10 Oct 2019 | Premiered: 10 Oct 2019

CloudPassage
1 - 25 of 3317 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement