IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3846 Matches Previous Page  |  Next Page
2018 State of the Firewall
sponsored by FireMon
RESOURCE: Even as network security undergoes expansion, the role of the firewall in network security remains critical. Download this resource to review results from a 2018 Firemon survey.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

FireMon

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets
sponsored by Fidelis
WHITE PAPER: Find out how metadata can transform the way you detect and investigate critical security threats in your network.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

Fidelis

Ensure Data Protection with Fidelis Network
sponsored by Fidelis
VIDEO: To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.
Posted: 17 Aug 2018 | Premiered: 17 Aug 2018

Fidelis

Automate & Accelerate Your Security Operations
sponsored by Fidelis
EBOOK: Put your current threat detection and response strategy to the test and with a checklist of the 5 must have security automation capabilities to see if your enterprise is up to speed.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

Fidelis

Modernizing IT Security with Cloud Device Computing Platforms
sponsored by Google
RESOURCE: Learn how this modern, cloud-based device computing platform, can be an effective approach to your organization's major security challenges
Posted: 17 Aug 2018 | Published: 31 Jul 2018

Google

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017 the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

ComputerWeekly.com

Disrupting Security: Revamping IT Security Through SecOps and Incident Management
sponsored by PagerDuty
EBOOK: Learn how SecOps is revolutionizing security management and how organizations can adopt it in order to meet the security threats of today, as well as those they'll face tomorrow. Keep your organization's name out of the next headline involving a major security breach.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

PagerDuty

Modern Management of Windows Devices with VMware Workspace One
sponsored by VMware
RESOURCE: Discover ways your organization can let its employees work with the devices they want to use, within or outside of the organization, all while ensuring secure and compliant access to your organization's resources.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

VMware

Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results that 193 CIOs and IT Managers answered regarding compliance, regulations, and organizational priorities of security and security staff training.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Mimecast

First Midwest Bank Uses Fidelis Deception to Detect and Respond to Security Anomalies
sponsored by Fidelis
CASE STUDY: Learn how a suburban bank used Fidelis Deception to detect and respond to incidents in their network, catching cybercriminals in the act of their crime.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Work Smart and Stay Safe with Chrome Enterprise
sponsored by Google
WEBCAST: Tune in, to learn about an OS and browser that offers proactive protections, granular policy controls, and continuous vulnerability management to help prevent breaches.
Posted: 16 Aug 2018 | Premiered: Jul 26, 2018

Google

Utilizing Deception for Effective Breach Detection
sponsored by Fidelis
WHITE PAPER: Learn how sophisticated deception software can cover all of the phases of the attack life cycle within your network, so you can catch cybercriminals in the scene of the crime.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Case Study: IT Director, Marek Laskowski, DZP
sponsored by Fidelis
VIDEO: In this video, learn about Fieldis Elevate from IT Director, Marek Laskowski and how it provided DZP with an ability to rapidly detect, investigate, and resolve advanced attacks, enabling the firm to identify both known and unknown threats.
Posted: 15 Aug 2018 | Premiered: 15 Aug 2018

Fidelis

Accelerate and Simplify your Security Operations with Fidelis Elevate
sponsored by Fidelis
VIDEO: Learn how Fidelis Elevate provides understaffed and overwhelmed security teams with context, analysis, and automated workflows.
Posted: 15 Aug 2018 | Premiered: 15 Aug 2018

Fidelis

Managing Security on Shared Resources
sponsored by WinMagic
WEBCAST: Watch this video to learn about SecureDoc, an encryption tool that can help you strengthen security and maintain compliance, while enabling employees to use their own devices safely.
Posted: 15 Aug 2018 | Premiered: Apr 3, 2017

WinMagic

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In this executive brief, The Secureworks Counter Threat Unit researchers identified lessons learned in threat behaviors, the global threat landscape, and security trends. Take a look at what they found, so you can help protect your organization and learn from past cybersecurity mistakes.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Dell SecureWorks

Strengthening Your Security with SecureDoc
sponsored by WinMagic
WEBCAST: Watch this short video to learn about protecting your assets with SecureDoc, which can help strengthen your organization's security and remain compliant.
Posted: 15 Aug 2018 | Premiered: Aug 15, 2018

WinMagic

Context-Aware Security Provides Next-Generation Protection
sponsored by Citrix
RESOURCE CENTER: Learn how a "context-aware" approach to security can help your enterprise identify suspicious activity by honing in on users and their interactions within the system.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Citrix

Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

Fidelis Deception Demo - Product Overview
sponsored by Fidelis
VIDEO: Tune into this webinar to learn how your organization can use modern deception defenses to ensure an efficient and strong post-breach defense.
Posted: 14 Aug 2018 | Premiered: 14 Aug 2018

Fidelis

Digital Transformation Must Include Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how you can create a unified security fabric for your network's defense that takes a broad view of endpoints, integrates with your existing security system, and automates key elements of network protection.
Posted: 14 Aug 2018 | Published: 07 Feb 2018

Fortinet, Inc.

How CIOs are Achieving Compliance Using Encryption Management in the New Regulatory Era
sponsored by WinMagic
RESOURCE: Download this resource for a look at a CXO briefing with a 'how to' guide for a simplified approach to compliance with encryption management.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic

You Can't Detect What You Can't See: Illuminating the Entire Kill Chain
sponsored by Fidelis
VIDEO: Visibility is a top challenge for cybersecurity teams today. Without having a clear view, it's almost impossible to detect threats across every stage of the kill chain. In this webinar, cybersecurity experts Dr. Chenxi Wang and Tim Roddy review the many blind spots in the security environment. Learn how to gain visibility, today.
Posted: 14 Aug 2018 | Premiered: 08 Aug 2018

Fidelis

The Security Practice Maturity Model: Where Do You Stand?
sponsored by Juniper Networks
RESOURCE CENTER: In this custom article, learn how your organization can take a simplified approach towards advanced threat protection and apply cyber-automation to its security strategy, today.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Juniper Networks

Making BitLocker Simple, Smart and Secure for You
sponsored by WinMagic
WHITE PAPER: Microsoft BitLocker already offers data protection capabilities like high-performance, built-in OS encryption, integration with Microsoft Azure and more, but learn of the potential opportunities and benefits that come with adding an additional encryption tool to BitLocker.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic
1 - 25 of 3846 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement