IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 4421 Matches Previous Page  |  Next Page
The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: As the technology we use at work expands, speed has never been more important for security operations teams. Security orchestration and automation is becoming a vital aspect of many organizations' security strategies. In this white paper, learn how many companies are using it to successfully tackle common security processes and investigation types.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measureable efficiency gains can be a time-consuming task. In this white paper, learn how to make your security team successful with the help of automation.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

SecureWorks and McLaren Partnership
sponsored by Dell SecureWorks
VIDEO: SecureWorks is the security partner of McLaren Group. Using SecureWorks has allowed McLaren to accelerate threat detection. SecureWorks applies machine learning as well as human and artificial intelligence to process logs. In this webcast, Jonathan Neal and Paul Brimacombe discuss their experience partnering with SecureWorks.
Posted: 12 Dec 2018 | Premiered: 10 Dec 2018

Dell SecureWorks

Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Swimlane

The Forrester Wave: Managed Security Services Providers (MSSPs)
sponsored by Dell SecureWorks
RESOURCE: This Forrester report covers a 26-criterion evaluation of European management security service providers (MSSPs). It identified the most significant MSSPs along with researching, analyzing and scoring them. The report also shows how each provider measures up and helps security leaders make the right choice.
Posted: 11 Dec 2018 | Published: 19 Nov 2018

Dell SecureWorks

Improving People's Health through Seamless Integration with Activity Meters
sponsored by HULFT
CASE STUDY: Download this case study to learn how one company used HULFT to provide the right level of security to ensure utmost confidentiality with regards to patient data, and how they saw success in one-third of the traditional development timeframe.
Posted: 10 Dec 2018 | Published: 10 Dec 2018

HULFT

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

The Security Leader's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 10 Dec 2018 | Published: 31 May 2017

Ping Identity Corporation

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Security Automation Quick Wins
sponsored by Siemplify
VIDEO: The state of security operations has led to teams embracing automation to combat alert overload and make the most of their security tools. However, many companies don't know where to start. This webcast details which processes are ripe for automation and gives practical examples for automating security operations processes.
Posted: 07 Dec 2018 | Premiered: 05 Dec 2018

Siemplify

Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit Manchester to examine the city's growing digital and e-commerce industry and find out why the former home of the UK rag trade has been so successful. We look at the challenges of IT security in the quantum computing age. And we talk to Bloomberg's CTO about tech innovation. Read the issue now.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

ComputerWeekly.com

MSSP Buyer's Guide: For Security Orchestration & Automation Platforms
sponsored by Siemplify
WHITE PAPER: As the MSSP market continues to flourish, customer demand and intense competition places margins under constant pressure. This guide outlines the challenges faced by MSSPs and sets out the criteria to consider when presented with orchestration as a solution. It also provides direction regarding the implantation of orchestration.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Siemplify

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

ComputerWeekly.com

Reduce Risk and Protect Privacy Across Enterprise Systems
sponsored by Micro Focus
PRODUCT OVERVIEW: A staggering amount of organizations are storing sensitive business data in inactive file shares, creating an increased risk of data loss. With data breaches on the rise, poorly protected data makes your business an easy target. Discover the advantages of a secure content management system. Reduce the cost and complexity of securing your data.
Posted: 06 Dec 2018 | Published: 30 Jun 2018

Micro Focus

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals continued on their rampage in 2018 hacking into name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down in 2019. In this webcast, Brian NeSmith walks through the top cybersecurity predictions for 2019 and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Managed Print Services Solutions & support services
sponsored by Xeretec
BROCHURE: A Managed Print Service (MPS) offers businesses a quick and simple way to reduce costs and improve productivity. But with so many solutions on the market, how do you ensure that your MPS will overcome the unique needs of your organization? Download this brochure to explore the benefits of a personalized MPS.
Posted: 06 Dec 2018 | Published: 31 Dec 2017

Xeretec

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Complete Guide to Cloud Security in Health IT
sponsored by Virtustream
EGUIDE: In this e-guide, uncover 4 ways that cloud service providers offer advanced protection. You'll also learn about the benefits and drawbacks of considering a cloud-based EHR system.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Virtustream

Manage Risk and Compliance with ServiceNow GRC
sponsored by ServiceNow
RESOURCE: The global regulatory environment continues to evolve making it imperative for organizations to have an integrated risk program. Are you well-positioned to monitor, prioritize, and automate response to business risks in real time? Learn about ServiceNow GRC – an option that could help you ensure rapid identification and response to risk.
Posted: 05 Dec 2018 | Published: 31 Dec 2018

ServiceNow
1 - 25 of 4421 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement