IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
101 - 125 of 3324 Matches Previous Page  |  Next Page
Informatica Eliminates SSH Key Management with Aporeto Cloud PAM on AWS
sponsored by Aporeto
CASE STUDY: In this case study, dive into the benefits and solutions that Informatica received when utilizing Aporeto’s Cloud PAM to provide them with comprehensive visibility and better control over their sprawling environment.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Aporeto

The Madness of IT Security Sprawl
sponsored by PortSys
RESOURCE: Does adding more complexity to your IT infrastructure make you safer? Many organizations believe the more security solutions, the better. In this article, learn why that is not the case and why there needs to be a stop to “The Madness of IT Security Sprawl” today.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

It May Be Time To Rethink RDP
sponsored by PortSys
RESOURCE: RDP, Microsoft’s widely used remote access tool, continues to be a prime target of malicious cyber criminals. The problem is only getting worse as hackers broaden their reach through highly advanced automated attacks. In this article, learn why a zero trust solution can help strengthen and simplify your overall access infrastructure.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

Can Zero Trust Fix What’s Wrong with IT Security?
sponsored by PortSys
RESOURCE: Why is zero trust such a prominent discussion both in the board room and among IT security professionals? Read this article for a look at how zero trust access changes the IT security game today.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

Cisco Cybersecurity Series 2019: Hunting for Hidden Threats
sponsored by Cisco Umbrella
WHITE PAPER: In the latest Cisco Umbrella Cybersecurity Report, explore the ins and outs of threat hunting and a how-to guide for creating a threat hunting team at your organization.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Cisco Umbrella

How Machine Learning Can Help You Keep up with Current Threats
sponsored by Dell SecureWorks
EGUIDE: Although organizations are spending billions of dollars on cybersecurity products, cyberattacks are continuing to be successful. This means that their tools need to be updated. In this e-guide, learn how AI and ML can help to improve your cybersecurity tools and processes.
Posted: 30 Sep 2019 | Published: 25 Sep 2019

Dell SecureWorks

Chemical Cyber Threat Landscape – Overview
sponsored by Claroty
CASE STUDY: Download this case study to learn about the deployment process of the full Claroty Platform in an agrochemical plant and get an overview of the plant's physical and network structure, along with the security concerns and threat scenarios raised by the plant's team.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Claroty

Industrial Control Threat Intelligence
sponsored by Dragos
WHITE PAPER: In this white paper, learn how you can implement an ICS/OT threat intelligence product and measure your threat intelligence ROI today.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Dragos

Serverless Meets Secretless
sponsored by Aporeto
WHITE PAPER: Learn how you can adopt an IAM platform without the overheads of complete rewrites, removing the friction points of adopting cloud-native architectures and enabling the rapid operationalization of stronger security with significantly simpler operations.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Aporeto

Improving Lives Around the World through Easier Access to Knowledge
sponsored by PortSys
CASE STUDY: Learn how Research4Life was able to use PortSys Total Access Control to manage access across all programs and make the lives of end users around the world easier.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

PortSys

Breaking the Resource Vortex: A Case for Rapid Threat Detection and Response
sponsored by CenturyLink
RESOURCE: In this blog post, learn about a threat management, detection and response (MDR) platform where a customer can set policies based on threat characteristics and then specify a set of actions to take.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

CenturyLink

Microsegmentation Security: In the Network and the Cloud
sponsored by Illumio
EGUIDE: As network administrators move beyond traditional network segmentation, creating a good network microsegmentation strategy across the enterprise is essential. But what exactly is microsegmentation? Learn about different microsegmentation strategies such as zero-trust and cloud microsegmentation and how they can keep your enterprise secure.
Posted: 30 Sep 2019 | Published: 26 Sep 2019

Illumio

Unified Threat Management: Locking Your Network Down
sponsored by Comcast Business
WEBCAST: While there is no end-to-end "silver bullet" in terms of security solutions, Unified Threat Management (UTM) offers a suite of technologies that can make it a foundational part your network security. In this webinar from Comcast Business, discover UTM capabilities, functions, and benefits.
Posted: 30 Sep 2019 | Premiered: Sep 30, 2019

Comcast Business

PortSys Total Access Control Case Study
sponsored by PortSys
RESOURCE: While all companies are concerned about security, those in the financial services industry are especially so. Read this case study to see how a financial services firm used PortSys Total Access Control to address risk-based security for their devices and applications.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Cybersecurity a Central Ingredient in Evolving Digital Business Models
sponsored by CenturyLink
RESOURCE: Read this blog to learn about integrating sound cybersecurity practices in all areas of the organization, implementing new security capabilities that are baked into modern cloud services and turning DevOps into DevSecOps.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

TOPICS:  Security
CenturyLink

Don't Worry About Shadow IT. Shadow IoT Is Much Worse.
sponsored by CenturyLink
RESOURCE: Many organizations are worried about shadow IT, but what about shadow IoT? AKA, when people in your organization add internet-connected devices without IT's knowledge. Fortunately, protecting your organization from shadow IoT isn't so different from security best practices for shadow IT. Download this blog to learn more.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

CenturyLink

Enel Case Study: Securing Global Power Generation Network
sponsored by Nozomi Networks
CASE STUDY: Electric energy operators are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company. In this case study, learn how Enel was able to monitor, troubleshoot, and protect its industrial control network from a central location with the help of Nozomi Networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Nozomi Networks

Security Automation 101: Change Management and the Complexity Gap
sponsored by FireMon
WHITE PAPER: Download this e-book to see how the complexity gap is impacting organizations and the pivotal role network security policy automation plays in helping organizations reduce risk and enhance their overall security posture.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

FireMon

Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System
sponsored by Claroty
WHITE PAPER: A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date
sponsored by FireMon
WHITE PAPER: In this whitepaper, find 5 steps you can take to understand the current state of your network connections and ensure that the enforcement points designed to protect the environment remain up-to-date and carried out.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

FireMon

Take a Better TAC to Protect RDP
sponsored by PortSys
RESOURCE: Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Cloud Security Guardian integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: In this video, learn about Barracuda Cloud Security Guardian and how it orchestrates, automates, and simplifies configuration and management across all of your Azure firewalls.
Posted: 27 Sep 2019 | Premiered: 10 Jul 2019

Barracuda

Making the Business Case for Zero Trust Access
sponsored by PortSys
RESOURCE: Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.
Posted: 27 Sep 2019 | Published: 07 Jun 2019

PortSys

Security and Compliance with Microsoft Teams
sponsored by Insight
RESOURCE: In this climate of concern over security, how can businesses be sure the content they share on Microsoft Teams will remain safe? Find out in this blog post, which explores Teams' built-in features and how they help support your security and compliance needs.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Insight

New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation
sponsored by PortSys
RESOURCE: Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.
Posted: 27 Sep 2019 | Published: 22 Jul 2019

PortSys
101 - 125 of 3324 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement