IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
151 - 175 of 3777 Matches Previous Page  |  Next Page
2020 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Each year, Verizon releases a Payment Security Report, which aggregates findings across a number of security and compliance subject areas into valuable insights designed to help CISOs understand and overcome key security pitfalls, operational challenges and compliance roadblocks – read on for this year’s report.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Verizon

The Impact of COVID-19 On IT and Cybersecurity
sponsored by IBM
ANALYST REPORT: What changes were necessary to address the unexpected global pandemic? What types of cybersecurity challenges did the transition present? How are organizations doing? For answers to these questions, read this survey, conducted by ESG, to gain a perspective on the cybersecurity impact of COVID-19 as well as implications for the future.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

TOPICS:  Security
IBM

First Contact – Vulnerabilities In Contactless Payments
sponsored by ServiceNow
WHITE PAPER: Automated solutions can help financial institutions to increase their capacity to respond to vulnerabilities and incidents and ultimately decrease the size and cost of a breach. Download this webinar summary to learn more.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

TOPICS:  Security
ServiceNow

Cloud Pak for Security Buyer's Guide
sponsored by IBM
EBOOK: In cybersecurity, the term “platform” has become overused, making it difficult to cut through the noise and understand which factors matter in choosing the best option for your business. Download this buyer’s guide to find out what you should look for in a security platform.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

TOPICS:  Security
IBM

Bizcloud Experts Announces Acceptance Into AWS WAF Service Delivery Program
sponsored by AWS BizCloud
RESOURCE: AWS’ web application firewall (WAF) gives app dev teams the ability to design, deploy and protect enterprise web applications, distributed content, or APIs against common web exploits that potentially affect availability, compromise security or consume excessive resources. Read this article to learn about a new AWS WAF service delivery partner.
Posted: 10 Nov 2020 | Published: 21 Jul 2020

AWS BizCloud

How to Easily and Securely Implement MFA for Web and Web App to Protect Social Data
sponsored by Onegini
WHITE PAPER: As online services expand and high-security transactions increase, organizations are urged to strengthen their existing online portals and apps with an MFA solution to safeguard particularly sensitive transactions. But implementing this technology can be a difficult task. Read this white paper to learn how to easily and securely implement MFA.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

Onegini

Market Guide For Crisis/Emergency Management Solutions
sponsored by ServiceNow
RESEARCH CONTENT: The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.
Posted: 10 Nov 2020 | Published: 21 Aug 2020

ServiceNow

Work From Anywhere: The Mission-Critical Workforce Needs Dedicated, Portable, and Secure Connectivity
sponsored by CradlePoint
WEBCAST: One of the best ways to replicate an office network at home is by deploying a "wireless private network" or WPN – a completely separate and corporate-controlled network at home using LTE-based wireless. By doing so, IT can control the connectivity, reliability and security of the network. Watch this webcast to learn more.
Posted: 10 Nov 2020 | Premiered: Nov 10, 2020

CradlePoint

What Is Phishing
sponsored by Claranet
EGUIDE: More than a decade after its first appearance, phishing remains the most common and pervasive type of cyberattack – but what is phishing? Who is at risk? And what kinds of attack variants are there? For answers to these, and more, read this Phishing Educational Guide.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Securing SMBs in a World of Digital Transformation
sponsored by Claranet
WHITE PAPER: The era of digital transformation demands similar growth in security capabilities as well. While large enterprises have the resources to invest heavily in this area, small and medium businesses (SMBs) must be a bit more resourceful. Read this white paper, which highlights cybersecurity guidance for SMBs in the era of digital transformation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

CompTIA IT Security Community Data Breach Response Planning Guide
sponsored by CompTIA
RESOURCE: CompTIA's IT Security Community designed this resource to help you prepare a data breach response plan. The tips you'll find here range from the big picture (preplanning and testing) to the details (keeping related notes of an incident separate from day-to-day business), but are all designed to take fear of the unknown out of the equation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

CompTIA

Small Business Security: 4 Steps to Success
sponsored by Claranet
WHITE PAPER: Small businesses are popular targets for today’s hackers. However, by investing in right cybersecurity tools, these small businesses can significantly reduce their risk and facilitate good business growth. The following white paper provides 4 steps for small business cybersecurity success – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Mapping the Ransomware Landscape
sponsored by Claranet
WHITE PAPER: By 2021, ransomware is expected to have a global impact of $20 billion – these threats are growing in their severity, frequency and complexity. This guide from Claranet explores changes in the threat landscape, highlights emerging variants and offers best practices for your organization to implement – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

CW APAC: Expert advice on zero-trust security
sponsored by ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 09 Nov 2020 | Published: 19 Nov 2020

ComputerWeekly.com

Continuous Application Security with HCL AppScan
sponsored by HCL Software
PRODUCT REVIEW: This Enterprise Strategy Group (ESG) Technical Review highlights ESG’s evaluation of HCL AppScan and how it helps developers continuously secure applications. The review also discusses how to integrate AppScan into CI/CD pipelines and support other aspects of DevSecOps initiatives – read on for the full review.
Posted: 06 Nov 2020 | Published: 31 Aug 2020

HCL Software

Thales’ SafeNet Trusted Access Brings Security To Access And Authentication
sponsored by Thales
PRODUCT REVIEW: Selecting an identity and access management (IAM) tool that balances functionality with security can be difficult. This product review, written by third-party cybersecurity expert David Strom, provides a comprehensive overview and assessment of Thales’ SafeNet Trusted Access tool – read on to see what Strom has to say.
Posted: 06 Nov 2020 | Published: 31 Jan 2020

Thales

Continuous Security – Putting it all Together
sponsored by HCL Software
WHITE PAPER: Traditionally, Security Maturity models were linear in their approach – suggesting that true security has some sort of end goal. However, cybersecurity requires a more continuous and cyclical approach in order to constantly ensure security is adequate. Read this e-guide to learn more about achieving continuous cybersecurity.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

HCL Software

Cloud Security: A Buyer’s Guide
sponsored by Forcepoint
BROCHURE: The cloud security market boasts an overwhelming array of features, vendors and offerings. To help break up the noise, this Cloud Security: Buyer’s Guide offers 15 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization – read on to get started.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Forcepoint

The Practical Executive’s Guide To Data Loss Prevention
sponsored by Forcepoint
EGUIDE: When implemented successfully, data loss prevention (DLP) controls can have a massively positive impact on the wellbeing of your organization’s sensitive data – however, DLP controls are often an area of confusion. This e-guide aims to clear up confusion surrounding DLP by offering expert insights and tips for success – read on to get started.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Forcepoint

A Computer Weekly buyer's guide to supply chain resilience
sponsored by ComputerWeekly.com
EGUIDE: The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

ComputerWeekly.com

Modernize Your Video Security Solution with AI and Analytics
sponsored by Motorola, Inc.
WHITE PAPER: Within the next 5 years, there will be around 45 billion cameras on Earth. This abundance of information and data far outweighs our ability to process and analyze all this information on our own. In this white paper, learn about Motorola’s Avigilon, an assistive AI technology that helps security operators to detect critical events.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Motorola, Inc.

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

IBM

2020 SIEM Vendor Comparison Report
sponsored by IBM
RESOURCE: Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."
Posted: 05 Nov 2020 | Published: 05 Nov 2020

IBM

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems
151 - 175 of 3777 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info