IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3464 Matches Previous Page  |  Next Page
Ransomware Defense Checklist
sponsored by Cisco Umbrella
RESOURCE: The rise of ransomware over the past few years is an ever-growing problem and there are no signs of this lucrative criminal enterprise going away. Our safety checklist will ensure you are ready to defend your organization’s data against these threats. Use this checklist to ensure you are equipped to prevent a future ransomware attack.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Cisco Umbrella

API Security for Dummies
sponsored by Data Theorem
EBOOK: API Security for Dummies is a high-level introduction to the key concepts of API security and DevSecOps. Download now for an in-depth overview of the growth of the API economy, API security challenges (how to address them), and automation protection with DevSecOps.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Data Theorem

NIST Maturity Report
sponsored by Optiv
RESOURCE: The National Institute of Standards and Technology (NIST) cybersecurity framework exists to help organizations better understand, manage, and decrease cybersecurity risk. How aligned is your security program to this industry-accepted framework? Determine your NIST alignment by taking this quick quiz today.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Optiv

Adaptive Multi-Factor Authentication Data Sheet
sponsored by Okta
DATA SHEET: Today identity attacks can result in increased security risks, brand damage and outright fraud. Additionally, customers are expecting seamless access with minimal friction. Read on to learn about Okta Adaptive MFA and how it can allow good users in, while keeping attackers out.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Building a Well Managed Cloud Application
sponsored by Okta
WHITE PAPER: In this white paper, learn how you can increase user adoption and overall usability by simplifying user access and change management.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

The Next Wave of Bot-Driven Brute Force Attacks
sponsored by F5 Networks
EBOOK: With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Is Noise Pollution Making Your Data Less Secure?
sponsored by F5 Networks
WHITE PAPER: Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service may be able to help.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Okta + MuleSoft: Comprehensive API Access Control and Management
sponsored by Okta
DATA SHEET: As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

Okta + Experian: Identity Proofing Your Enterprise
sponsored by Okta
DATA SHEET: In this data sheet, find out how Okta and Experian work together to offer enterprises multiple layers of security and proofing to verify a user’s identity, and ensure they are entitled to access the information they’re trying to access.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

Your Cybersecurity Tech Stack Creating More Gaps
sponsored by Optiv
RESOURCE: It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Optiv

Leveraging CIAM To Unlock the Power of AI and IoT
sponsored by ForgeRock
WHITE PAPER: In this Forrester research report, discover how organizations securely deploy AI and IoT, and uncover key recommendations for protecting customer privacy without sacrificing business value.
Posted: 03 Dec 2019 | Published: 30 Sep 2018

ForgeRock

Newcomer Banyan Tackles Zero Trust with a Mesh-Based Approach to Multi-Cloud Security
sponsored by Banyan Security
ANALYST REPORT: In this 451 Research report, learn about Banyan’s new security offering that focuses on the authorization layer of a zero-trust platform, or what it calls a ‘zero trust continuous authorization framework.’
Posted: 03 Dec 2019 | Published: 03 Dec 2019

Banyan Security

Automation’s Rising Tide: How to Manage Bots in Today’s World
sponsored by F5 Networks
EBOOK: As bot technology, machine learning, and AI continue to evolve, it is more critical than ever for your organization to be prepared to deal with the impact of bots – both good and malicious. This e-book will guide you as you develop a comprehensive, flexible strategy to address the impact of bots. Read on to get started.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

F5 Networks

The Evolution of Zero Trust
sponsored by Banyan Security
WHITE PAPER: As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.
Posted: 03 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by ComputerWeekly.com
EZINE: German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 03 Dec 2019 | Published: 12 Dec 2019

ComputerWeekly.com

Modernizing Workforce IAM
sponsored by ForgeRock
WHITE PAPER: As organizations continue to trend towards digital identities, traditional identity and access management (IAM) systems need to either be extended or replaced to remain relevant and secure. In this white paper, go in-depth into 12 trends that are shaping this change and learn about empowering your digital transformation.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

ForgeRock

Banyan Security Zero Trust Remote Access Video
sponsored by Banyan Security
VIDEO: In this video, learn about a singular Zero Trust remote access platform that delivers dynamic trust scoring, continuous authorization and granular access enforcement.
Posted: 02 Dec 2019 | Premiered: 02 Dec 2019

Banyan Security

ForgeRock Identity Platform capabilities for Authentication under PSD2
sponsored by ForgeRock
WHITE PAPER: Across Europe, the Revised Payment Services Directive (PSD2) will drive drastic changes in the financial sector in the EU. In this white paper, explore the background and objectives of PSD2, and uncover recommendations for ensuring your organization is ready to meet these requirements.
Posted: 02 Dec 2019 | Published: 31 Jan 2019

ForgeRock

The Financial Adviser's Guide to Compliant IM and Collaboration
sponsored by Smarsh
WHITE PAPER: The rise of collaboration platforms and the compliance requirements they bring with them are a symptom of a larger reality: Workplace communications are changing. Read on to learn how you add IM and collaboration platforms to a compliant ecosystem in your organization.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

The Financial Adviser's Guide to Social Media Strategy and Policy
sponsored by Smarsh
WHITE PAPER: The U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA) recognize social media’s growing role in firms’ marketing strategies. In this guide, find practical steps to help you develop social media strategy and policy that meets social media recordkeeping and supervision regulatory requirements.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

What Every Company Should Know About Cookies
sponsored by Namogoo
EBOOK: Nearly every website relies on cookies to allow them to collect specific data on their visitors to enhance customer experience. But as helpful as they can be, the information stored on them can pose a privacy risk. In this e-book, explore the various types of cookies and how they will be affected by data privacy laws.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

Namogoo
1 - 25 of 3464 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement