IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
126 - 150 of 3424 Matches Previous Page  |  Next Page
The General Data Protection Regulation: Key Themes and Challenges
sponsored by Forcepoint
WHITE PAPER: Read this white paper to explore 3 major misconceptions about the GDPR, and uncover 5 key steps to help your organization perform a basic assessment of its data protection capabilities. Then, discover an approach that can help you get in line with the GDPR in 3 core areas.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Forcepoint

Luxury Retailer Replaces Legacy SIEM With Analytics-Driven SIEM
sponsored by Splunk
CASE STUDY: Read this case study to learn why this luxury retailer replaced their legacy SIEM system with a new analytics-based program to gain visual alerting, simple deployment and use, and more.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Splunk

Manufacturing Company Automates with Enterprise Security SIEM
sponsored by Splunk
CASE STUDY: Discover what benefits this manufacturing company gained by adopting a SIEM system to bolster their small security team.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Splunk

Detect Unknown Threats, Reduce Dwell Time, And Accelerate Response
sponsored by Dell and Intel
DATA SHEET: Click inside to learn about an endpoint detection and response tool that can help you detect complex attacks. This system offers continual monitoring and analysis of user behavior in your endpoints, and more.
Posted: 25 Jan 2018 | Published: 30 Nov 2017

Dell and Intel

Data Center Simplification with Hyperconverged Systems
sponsored by Nutanix
PRODUCT LITERATURE: You need to simplify your data center operations and the way to do that is through a platform that enables you to run your IT operations the way that best suits your organization's unique needs. In this paper, you will learn about a platform that enables you to choose how to run your data center, rather than locking you into its way.
Posted: 25 Jan 2018 | Published: 26 Jul 2017

Nutanix

A Cloud App Visibility Platform Gave this Airline Peace of Mind
sponsored by Forcepoint
CASE STUDY: Read this case study to learn what this geographically dispersed airline gained when they adopted a comprehensive cloud app visibility and control program.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Forcepoint

The Cyber Security at Your Company is at Risk
sponsored by Veracode, Inc.
WEBCAST: Click inside to learn how you can gain end-to-end, cloud-based platform security for both your endpoints and your application layer.
Posted: 24 Jan 2018 | Premiered: Jan 24, 2018

Veracode, Inc.

Secure Cloud Collaboration without the Complication
sponsored by Citrix
WHITE PAPER: There are still some lingering doubts about the cloud's ability to maintain high security standards, but you can put them to rest. Read this white paper to learn how cloud-based collaboration tools are securing the apps, data, files, and services you depend on every day to provide a safe collaboration space for your employees.
Posted: 24 Jan 2018 | Published: 19 Dec 2017

Citrix

How to Protect your Next-gen Extranet with a Software-defined Security Fabric
sponsored by Big Switch Networks
CASE STUDY: Fortune 20 Energy and Petroleum Company wanted to update its current extranet to better integrate new cybersecurity technologies and provide more monitoring capabilities, with a flexible network design. This case study explores how they leveraged a next-generation software-defined security fabric to do so.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Big Switch Networks

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 24 Jan 2018 | Published: 28 Sep 2017

SyncDog

Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM
sponsored by Splunk
WHITE PAPER: Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Splunk

The Truth about Cloud Security
sponsored by Citrix
EBOOK: The first impression that cloud computing left on people was that the technology was filled with security flaws. While the risks are real, the cloud is more secure now than most people think. Access this e-book to learn about using the cloud to protect your most sensitive data.
Posted: 23 Jan 2018 | Published: 21 Dec 2017

Citrix

Lessons Learned from a Decade of Data Breaches
sponsored by F5 Networks
RESEARCH CONTENT: As cybercrime grows, how can you better protect your business? The answer is to start understanding how these criminals target their victims, and how they get in. In this research report, find out what aspect of your IT environment is being targeted by criminals, how criminals choose their victims, and more.
Posted: 23 Jan 2018 | Published: 30 Nov 2017

F5 Networks

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

5 Security Tips to Work on a Personal Device
sponsored by Citrix
WHITE PAPER: Mobility and personal devices are defining factors of the future workforce. Read this report for five tips to help you secure your personal device at work and minimize risk for yourself and your business. You will also see how employees act differently when using personal versus work devices, the importance of updating devices, and more.
Posted: 22 Jan 2018 | Published: 16 Nov 2017

Citrix

Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

A WhiteHat Sentinel Product Family Overview
sponsored by WhiteHat Security
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

WhiteHat Security

Computer Weekly – 23 January 2018: Will banking regulations create a new Big Bang?
sponsored by ComputerWeekly.com
EBOOK: In this week's Computer Weekly, we look at two new financial services regulations, PSD2 and open banking, which promise to revolutionise the industry by opening up customer data. We ask security researchers to explain the Spectre and Meltdown processor flaws. And we examine the NVMe protocol and its likely benefits for storage. Read the issue now.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

ComputerWeekly.com

The DevSecOps Global Skills Survey
sponsored by Veracode, Inc.
RESEARCH CONTENT: This DevSecOps Global Skills Survey looks at the responses from 400 DevOps professionals on the state of DevOps workforces and education. Gain insight into how developers, IT ops, QA professionals, and even security view current DevOps and DevSecOps practices.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Veracode, Inc.

Why Mobile Device Event Correlation Matters
sponsored by SyncDog
WHITE PAPER: A recent study by Gartner reveals 3 key challenges enterprises will deal with as more personal phones and tablets invade the workplace: governance and compliance, mobile device management, and security. Learn how to deal with these challenges head-first inside this white paper.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

SyncDog

Getting the Board on Board with Application Security
sponsored by WhiteHat Security
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Innovation Insight for Security Orchestration, Automation and Response
sponsored by ServiceNow
RESEARCH CONTENT: This Gartner report analyzes security orchestration, automation, and response (SOAR) tools and explores how they can help you improve security operations efficiency, quality and efficacy for your organization.
Posted: 18 Jan 2018 | Published: 30 Nov 2017

ServiceNow

Financial Institution Security
sponsored by enSilo
RESOURCE: Reviewing and selecting endpoint products to protect a financial institution's servers and ATM's is an extensive process.This resource offers strategies for improving security and downtime within financial institutions.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage
126 - 150 of 3424 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement