IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
176 - 200 of 3409 Matches Previous Page  |  Next Page
DTMF Masking for PCI DSS Compliance
sponsored by Semafone
WHITE PAPER: PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Semafone

Extending Security Technology to the Cloud: Threat Detection & Response
sponsored by RSA
WHITE PAPER: According to Gartner, spending on cloud system IaaS will grow from $34 billion in 2017 to $71 billion through 2020. This white paper offers strategies for improving threat detection and response within cloud technologies.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

5 Ways to Boost Your Security Team's Impact
sponsored by RSA
WHITE PAPER: 93% of security operations center (SOC) managers are unable to triage all potential threats. Explore this resource to uncover 5 tools to boost your security team's impact.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

Password Management and GDPR Compliance
sponsored by Fast Pass Corp
RESEARCH CONTENT: This IDC Technology Spotlight introduces the identity and access implications of GDPR, and shows why password reset represents a potential risk factor that may compromise compliance. Find out how self-service password reset can lower this risk to help your organization follow GDPR guidelines.
Posted: 02 Jan 2018 | Published: 31 Jan 2017

Fast Pass Corp

How IT Services are Implementing Fastpass Security Tools
sponsored by Fast Pass Corp
CASE STUDY: In this case study, find out how CCBC IT Service successfully reduced calls to the IT Service Desk with a self-service password reset tool. Learn how this strategy helped to maintain current call performance without increasing staffing levels.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

Fast Pass Corp

Business-Driven Security and the GDPR
sponsored by RSA
WHITE PAPER: As the GDPR quickly approaches, privacy and data protection will no longer be "nice to have" benefits. Lacking them will become critical risks, both financial and reputational. Access this whitepaper for insight into data protection mandates in the GDPR and how your organization can get prepared.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

RSA

How Does Mobile Device Management Differ from Traditional Security?
sponsored by Seqrite
WHITE PAPER: In this white paper explore the need for an mobile device management (MDM) system, as well as several best practices for selecting and deploying a comprehensive MDM solution to your enterprise in a way that will be beneficial to security, and intuitive for employees.
Posted: 28 Dec 2017 | Published: 28 Dec 2017

Seqrite

Unified Threat Management: A Modern Solution to a Modern Problem
sponsored by Seqrite
WHITE PAPER: Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Data Loss Prevention: Best Practices
sponsored by Seqrite
WHITE PAPER: In order to minimize the damage data loss does to your organization, you need a strong data loss protection solution. This white paper details the 3 types of data you need to be securing, as well as some best practices to keep in mind.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Threats Posed by Portable Storage Devices
sponsored by Seqrite
WHITE PAPER: In this white paper, find out if security policies alone are the best solution to mitigate the risks posed by portable storage devices, as well as explore some of the threats that these devices pose if they go uncontrolled.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

Protecting Your Enterprise from Ransomware Attacks
sponsored by Seqrite
WHITE PAPER: Click inside to take a more in-depth look at what makes a ransomware attack unique, and why you need to take steps to protect yourself. Then, learn about 5 protection mechanisms you can put into place.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

How Automated Security Workflows Help you Stay Above Water
sponsored by VMware
WHITE PAPER: Explore the changing nature of risk in the data center and how network virtualization enables automation of your security operations.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

VMware

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

Comparing Security Information and Event Management Providers
sponsored by Splunk
RESEARCH CONTENT: With so many vendors on the market offering SIEM services that differ in subtle ways, how do you know which one is right for you? This Gartner Report seeks to answer that question by listing the pros and cons of 19 SIEM offerings so you can make your own informed choice.
Posted: 21 Dec 2017 | Published: 04 Dec 2017

Splunk

Secure the Workplace Without Locking Down Your People
sponsored by Atos
RESOURCE: What if I told you that you could secure your workplace without taking away employees' flexbility? Read on to learn about the guidelines you need to follow to make this happen and the topics you will need to address for the future of your workplace security strategy.
Posted: 20 Dec 2017 | Published: 28 Nov 2017

Atos

Maintain Control of the Workplace by Letting Go
sponsored by Atos
RESOURCE: In the digital workplace, you need to accommodate various workstyles while managing costs and keeping enough control to properly secure systems and data. Read on to see what you need to consider when transitioning to a digital workplace and how enabling employees to choose how they work yields more satisfied, productive workers.
Posted: 20 Dec 2017 | Published: 09 Nov 2017

Atos

Atos Workplace Mobility Factsheet
sponsored by Atos
WHITE PAPER: Discover a mobile device lifecycle management service that takes pressure off your IT team, prevents shadow IT from creeping into your organization, and leaves you in control of your devices.
Posted: 20 Dec 2017 | Published: 25 Oct 2017

Atos

Workplace Mobility for Nuclear Plant Maintenance
sponsored by Atos
RESOURCE: When your workforce relies on mobile devices to do their jobs, you need to provide the devices or run major security and compliance risks. This infographic runs down the necessities that you need to look for when considering devices, as well as the challenges solved by automated device provisioning and lifecycle management.
Posted: 19 Dec 2017 | Published: 19 Dec 2017

Atos

Using Machine Learning and Analytics to Close the Security Skills Gap
sponsored by RSA
WHITE PAPER: This resource provides insight into utilizing analytics and machine learning to reduce the load on security professionals, while increasing visibility and predicting attackers' next steps.
Posted: 19 Dec 2017 | Published: 19 Dec 2017

RSA

A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
sponsored by Delphix
WEBCAST: Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.
Posted: 15 Dec 2017 | Premiered: Dec 6, 2017

Delphix

CIO Trends #6: Nordics
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

ComputerWeekly.com

Data Defense Doesn't Win Championships
sponsored by Delphix
RESOURCE: Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Delphix

Data Management Platforms for GDPR: Buyer's Checklist
sponsored by Delphix
RESOURCE: Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.
Posted: 12 Dec 2017 | Published: 31 Oct 2017

Delphix

How SMBs are Changing their Security Tactics
sponsored by Booz Allen Hamilton
EGUIDE: Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Booz Allen Hamilton

Definitive Guide to Third-Party Risk Management
sponsored by Navex Global
RESOURCE: According to a Navex Global Benchmark Report, 1/3 of respondent organizations have faced legal or regulatory issues that involved third parties, with 50% involving average costs per incident of $10,000 or more. Take a look at this 30-page guide to learn how to successfully mitigate your organization's third-party risks.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Navex Global
176 - 200 of 3409 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement