IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
101 - 125 of 3394 Matches Previous Page  |  Next Page
Top 9 DDoS Threats Your Organization Must Be Prepared For
sponsored by Radware
RESOURCE: Utilize this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Radware

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015

Nuix

Phoenix Contact's mGuard Integration with SilentDefense
sponsored by SecurityMatters
RESOURCE: This resource uncovers the key benefits of the integration of mGuard and SilentDefense to make industrial networks more resilient to cybersecurity threats and enable users to quickly identify and react to network malfunctions.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

SecurityMatters

Industrial Networks Visibility & Control
sponsored by SecurityMatters
RESOURCE: To defend control networks, it is imperative to monitor network and process operations to detect dangerous messages. Leverage this resource to gain full visibility and control over industrial networks, while protecting from unauthorized access.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

SecurityMatters

2017's 5 Most Dangerous DDoS Attacks & Steps to Mitigate Them
sponsored by Radware
RESOURCE: Learn the 5 most dangerous attacks in 2017 and the steps to protect your organization's network.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Radware

WAF and DDoS: Perfect Bedfellows
sponsored by Radware
RESOURCE: This resource explains how DDoS and WAF strategies should be integrated together to improve attack mitigation capabilities while maintaining customer expectation.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

Radware

Image Overload: How the Growth in Imaging Volume is Changing Radiology
sponsored by Merge, an IBM Company
RESOURCE: Find out why the nature of medical imaging is changing along with the growing demand for radiologists, escalating workloads, and more.
Posted: 23 Feb 2018 | Published: 22 Feb 2018

Merge, an IBM Company

3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER: In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018

Illusive Networks

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Why a Unified Approach to IT and OT Network Security is Critical
sponsored by Skybox Security
WHITE PAPER: One of the biggest security challenges organizations are struggling with is limited visibility of the IT-OT attack surface. This white paper examines the challenges, implications and benefits of a unified approach to managing security in converged IT and OT networks.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Skybox Security

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
RESOURCE: This infographic summarizes key findings of the 2017 Ponemon Juniper Report detailing why automation technologies are joining forces with current security strategies.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Juniper Networks

Security and the de-Commoditization of Data
sponsored by Juniper Networks
WEBCAST: According to recent reports, 81% of breaches involve stolen or weak passwords. In this webcast, learn how to prevent a security attack and protect your organization from a data breach.
Posted: 20 Feb 2018 | Premiered: Sep 30, 2017

Juniper Networks

Externalized Dynamic Authorization in a MicroServices World
sponsored by Axiomatics
RESOURCE: This 3-part resource describes how your organization can apply Externalized Dynamic Authorization to an API and a microservices architecture that uses OAuth 2.0 flows or OpenID Connect (OIDC).
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Axiomatics

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

Mobile security trends point to unifying policy and tools
sponsored by SearchSecurity.com
EBOOK: Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

SearchSecurity.com

Freedom Security Alliance Dramatically Accelerates Security Response Services
sponsored by ServiceNow
CASE STUDY: Explore this case study to gain insight into how Freedom Security Alliance (FSA) improved their cybersecurity strategy by accelerating security response services.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Governance, Risk, and Compliance: The Business and IT Challenge
sponsored by ServiceNow
RESOURCE: This resource reveals the 6 benefits of the ServiceNow Governance, Risk, and Compliance (GRC) unified platform. Learn how to effectively respond to security risks in real-time through continuous monitoring, prioritization and automation and uncover key use cases.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Vulnerability and Threat Trends Report 2018
sponsored by Skybox Security
RESEARCH CONTENT: This 18-page research report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Skybox Security

How to Secure Your Network from Ransomware
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the trends in ransomware, from what attackers are hoping to gain, to what it costs victims. Click inside to learn about a new approach to defending against this malware through cloud-based threat analysis.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Palo Alto Networks

Ransomware: Unlocking the Lucrative Criminal Business Model
sponsored by Palo Alto Networks
RESEARCH CONTENT: To better understand how you can combat ransomware, read this Unit 42 Report which outlines the history of ransomware, as it has evolved from a tool used for profit, to a weapon of espionage. Then, learn about how you can prepare for these attacks and respond to them both in their current form, and as they continue to mutate in the future.
Posted: 20 Feb 2018 | Published: 31 Dec 2017

Palo Alto Networks

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

CW Nordics ezine February 2018
sponsored by ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 19 Feb 2018 | Published: 22 Feb 2018

ComputerWeekly.com

Global De-Duplication for Encrypted Data
sponsored by Carbonite
WHITE PAPER: Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Carbonite

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
WEBCAST: According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.
Posted: 16 Feb 2018 | Premiered: Feb 16, 2018

Juniper Networks
101 - 125 of 3394 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement