IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
26 - 50 of 3413 Matches Previous Page  |  Next Page
Evolving Micro-Segmentation for Preventive Security: Adaptive Protection in a DevOps World
sponsored by VMware
ANALYST REPORT: Download this SANS research white paper to learn about evolving micro-segmentation for preventive security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

VMware

The Hacker Powered Security Report 2019
sponsored by HackerOne
ANALYST REPORT: Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

HackerOne

IT Security is Broken
sponsored by VMware
RESOURCE: Only 25% of EMEA business leaders are confident in their cybersecurity. In this infographic, learn how you can fix IT security by building intrinsic security into everything, encouraging a collaborative culture of cybersecurity awareness, and more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

VMware

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

Euronext Safeguards Pan-European Trading with Cymulate Breach and Attack Simulation
sponsored by Cymulate
CASE STUDY: Euronext, a leading pan-European marketplace, sought a more cost-effective way to test their security posture to complement the cyberattack simulations they have been running to date. After reviewing different solutions, Euronext decided to deploy Cymulate's Breach & Attack Simulation. In this case study, explore the benefits that Euronext saw.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Cymulate

Gigamon Industry Brief: Enterprise
sponsored by Gigamon
PRODUCT OVERVIEW: Network performance and security are vital elements of any business. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. In this brief, learn how Gigamon Visibility Platform can help balance the needs for network efficiency and security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Gigamon

Optimizing the Security Stack
sponsored by Morphisec, Inc.
DATA SHEET: In this white paper, examine the optimal way to protect endpoints from both known and unknown attacks and review the Windows Defender Antivirus offering.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Morphisec, Inc.

Tech Powering your CX Might be Dragging Revenue
sponsored by The Media Trust
RESOURCE: Unknown third-party code outside of your control can introduce new risks or heighten existing ones. Read on to learn about digital risk scans and how you can reduce digital revenue threats like customer information theft, data leakage, site latency, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

The Media Trust

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: CyberEdge Group's 6th annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Download this report to uncover countless insights you can use to better understand how your priorities and security postures stack up against those of your peers.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Gigamon

How to Automate API Security
sponsored by Data Theorem
WHITE PAPER: As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Data Theorem

Red Cloak Threat Detection & Responses
sponsored by Dell SecureWorks
WEBCAST: Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.
Posted: 13 Sep 2019 | Premiered: Sep 13, 2019

Dell SecureWorks

Australian Bureau of Statistics Achieves Compliance Rates of over 99%
sponsored by Concur Technologies
CASE STUDY: How did the Australian Bureau of Statistics (ABS) overcome the problems posed by their multiple disparate systems to achieve compliance rates of over 99%? View this case study to find out more, and learn about Concur's role in their transformation.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Concur Technologies

Morphisec Unified Threat Prevention
sponsored by Morphisec, Inc.
DATA SHEET: Today's advanced cyberattacks hit quickly and are engineered to evade detection-based forms of defense. Security teams and their tools are left trying to constantly catch up. Morphisec doesn't have to. Download this brief to learn about the benefits and capabilities of Morphisec Unified Threat Prevention.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Morphisec, Inc.

Oklahoma Municipal Power Authority Energizes Team's Secure Remote Access with TAC
sponsored by PortSys
CASE STUDY: Technology inventions are being integrated across the energy sector with legacy hardware and software systems. However, the patches on these legacy systems can't keep up with today's threats. In this case study, learn how these challenges led to Oklahoma Municipal Power Authority deploying Total Access Control to help provide secure remote access.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

PortSys

Building a Customer-Obsessed IAM Team
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester Report for an overview of the skills and job descriptions required to manage CIAM effectively. This report also details hiring best practices and the typical organizational ownership of CIAM and how it plays with other technology management and business teams.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Akamai Technologies

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
EBOOK: How can you protect your organization from malicious cryptomining? Download this brief to learn how Cisco Umbrella can block at the IP and domain level, as well as analyze risky domains and much more.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Cisco Umbrella

The Human Factor 2019 Report
sponsored by Proofpoint
ANALYST REPORT: Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.
Posted: 12 Sep 2019 | Published: 31 Aug 2019

Proofpoint

6 Degrees of Network Security
sponsored by Cisco Umbrella
RESOURCE: A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Download this infographic to uncover 6 common security pitfalls that put your users, their devices, and your data at risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Cisco Umbrella

Web Browser-Based Attacks
sponsored by Morphisec, Inc.
RESOURCE: Browsers are integral to an effective working environment but they also serve as the perfect cyberattack vector. Web-based attacks are one of the top methods of system compromise and they are on the rise. In this brief, explore common types of web threats.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Morphisec, Inc.

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Rethinking Third-party Cyber Risk Management
sponsored by CyberGRX
WHITE PAPER: In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Morphisec Plus Defender AV And ATP
sponsored by Morphisec, Inc.
DATA SHEET: In this solution brief, learn about the Morphisec Unified Threat Prevention platform and how it can terminate advanced threats.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Countering Evasive Threats With Moving Target Defense
sponsored by Morphisec, Inc.
WHITE PAPER: Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

Ramp Up Security and Productivity with Cloud MFA & SSO
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, learn about a cloud identity and access management (IAM) solution that cost-effectively mitigates password security and access control concerns, improves user productivity, and is simple enough for generalists to integrate and manage.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Ping Identity Corporation
26 - 50 of 3413 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement