IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3464 Matches Previous Page  |  Next Page
Powerful and secure data transmission as key element of IT security
sponsored by Rohde & Schwarz
WHITE PAPER: Organizations are becoming increasingly aware of the need to prioritize IT security in order to ensure protection grows at the same rate as productivity. However, the constantly changing nature of IT security can make it unclear where to start. This white paper provides an overview of the IT security fundamentals – read on to get started.
Posted: 11 Aug 2020 | Published: 11 Aug 2020


Cloud Access Security Brokers: Top Vendors & Offerings
sponsored by Duo
RESOURCE: The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.
Posted: 11 Aug 2020 | Published: 05 Nov 2019


Cloud is the dream, don’t let risk and compliance be your nightmare
sponsored by Xtravirt
WHITE PAPER: Organizations worldwide are adopting cloud capabilities at an unprecedented rate in order to ensure flexibility and scalability in uncertain times. However, effective cloud environments require cloud-ready compliance and risk considerations. Download this white paper to evaluate and gauge your organization’s cloud security readiness.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Xtravirt

The Essential Guide to Foundational Security Procedures
sponsored by Splunk
WHITE PAPER: Download your complimentary copy of “The Essential Guide to Foundational Security Procedures” to learn how to build standard security procedures, respond to threats quickly with orchestrated workflows, and leverage Splunk Phantom for orchestration and automation.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Splunk

Take your SIEM to the Cloud
sponsored by Splunk
WHITE PAPER: Download your complimentary copy of the white paper Take Your SIEM to the Cloud to learn about how to improve your security posture using a cloud-based SIEM, the flexibility a cloud-based SIEM solution can provide, and the power of big data analytics and a SIEM in the cloud.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Splunk

Secure Hybrid Cloud: The Strategic Approach to Enterprise IT
sponsored by IBM
ANALYST REPORT: This 451 Research Pathfinder report was written to help navigate IT and security decision-makers through specific issues related to hybrid cloud security technologies and provides recommendations & considerations throughout the decision-making process. Download the report to get started.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

IBM

Panel Discussion: Securing the Cloud
sponsored by Dell SecureWorks
WEBCAST: The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Dell SecureWorks

Enterprise Supernova: The Data Dispersion Cloud Adoption and Risk Report
sponsored by McAfee
WHITE PAPER: In this white paper, discover survey results from 1,000 enterprises in 11 countries and an investigation into anonymized events from 30 million enterprise cloud users to provide a holistic view of modern data dispersion, so you can learn and adopt your own security practice.
Posted: 10 Aug 2020 | Published: 10 Aug 2020


Cloud Insiders - Risk and Compliance in the Hybrid Cloud
sponsored by Xtravirt
WEBCAST: A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Xtravirt

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: The Secureworks Counter Threat Unit (CTU) regularly conducts research and releases reports related to current developments in threat behaviors and cybersecurity trends. In their most recent Threat Intelligence report, analyze March and April 2020 to discover how COVID-19 shaped the threat landscape, workplace trends, and more.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Dell SecureWorks

Empower Security Analysts Through Guided EDR Investigation
sponsored by Duo
WHITE PAPER: Today’s EDR solutions are often better tailored to larger enterprises – leaving most security teams feeling overwhelmed and at risk. This Forrester report takes a closer look at an emerging EDR trend – guided investigation – which leverages automation to enable greater security, efficiency and scale. Read on to see what Forrester has to say.
Posted: 10 Aug 2020 | Published: 31 May 2019


Microsoft Teams Guest Access: To Do or Not to Do?
sponsored by Nucleus Cyber
RESOURCE: In this blog, learn how NC Protect provides the context and content awareness to adapt access controls and sharing rights down to the file or chat message level to ensure your employees and guest can collaborate securely.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Nucleus Cyber

10 Ways to Take MITRE ATT&CK From Plan to Action
sponsored by Splunk
WHITE PAPER: In this e-book, explore how the MITRE ATT&CK framework helps different parts of the organization.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Splunk

CipherTrust Data Discovery and Classification from Thales
sponsored by Thales
VIDEO: To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
Posted: 10 Aug 2020 | Premiered: 23 Mar 2020

Thales

How to Design IoT Infrastructure in 7 Parts
sponsored by ARM
EGUIDE: As with any new technology, getting started with IoT presents many challenges, starting with setting up IoT infrastructure. Organizations can prepare their IoT deployments for success by understanding each IoT infrastructure component and how they all work together. In this e-guide, explore the 7 key components of IoT infrastructure.
Posted: 09 Aug 2020 | Published: 07 Aug 2020

ARM

Empowering Business Innovation: Ricoh USA, Inc. Partners for Success
sponsored by Dell SecureWorks
CASE STUDY: In this case study, discover how Ricoh, in collaboration with Secureworks, implemented, monitored and managed end-to-end security services in order to support their digital transformation initiatives and growing network complexity.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Dell SecureWorks

The State of Email Security 2020
sponsored by Mimecast
EGUIDE: The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Mimecast

Access management: An evaluation and comparison of vendors
sponsored by IBM
RESOURCE: SaaS-delivered access management has become the norm – enabling organizations to provision or prohibit access throughout their dynamic networks. This Gartner Magic Quadrant Report provides an unbiased evaluation of key vendors and offerings within the access management landscape. Download this report to see who were crowned as leaders.
Posted: 07 Aug 2020 | Published: 12 Aug 2019

IBM

2020 SIEM Vendor Comparison Report
sponsored by IBM
ANALYST REPORT: Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."
Posted: 07 Aug 2020 | Published: 18 Feb 2020

IBM

Privileged Account Management for Dummies
sponsored by IBM
EBOOK: In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

E-Book: 5 Questions to Ask Before You Upgrade to a Modern SIEM Solution
sponsored by IBM
EBOOK: Traditional cybersecurity approaches are no longer viable for organizations as they balance the modern needs of compliance requirements and technological innovation. The need for modern security has given rise to SIEM. This e-book poses 5 critical questions to ask yourself before upgrading to a SIEM solution.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

Pervasive Data Defense Platforms Address Cloud Security Challenges
sponsored by McAfee
ANALYST REPORT: The complexity of managing sensitive data across hybrid cloud and multi-cloud environments is ushering in a new era of pervasive data defense and response platforms. Download this IDC report for an overview of the security benefits these platforms provide.
Posted: 07 Aug 2020 | Published: 07 Aug 2020


Why Traditional EDR Is Not Working—and What to Do About It
sponsored by McAfee
ANALYST REPORT: The EDR market has exploded in recent years. But just because the product carries an EDR description, doesn’t mean those products have been proven particularly effective. In this SANS white paper, discover pitfalls in current EDR deployments, a checklist for evaluating EDR products, and much more.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

1 - 25 of 3464 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info