IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
26 - 50 of 3086 Matches Previous Page  |  Next Page
Global Online Payments Company Implements MFA for Sensitive Systems
sponsored by Silverfort
CASE STUDY: In this case study, find out how Silverfort enabled BlueSnap to comply with the PCI DSS by securing remote and privileged access with MFA and auditing all user access across the organization.
Posted: 22 May 2019 | Published: 22 May 2019

Silverfort

Why 56% of Large Businesses are Turning to SDN for Cybersecurity
sponsored by Verizon
RESOURCE: Cybersecurity is a critically important issue for companies. In this resource, learn how software-defined networking (SDN) can enable organizations to virtualize and automate their network operations which, offers businesses a valuable new means to enhance their security.
Posted: 22 May 2019 | Published: 10 Jul 2018

Verizon

Cloud Security: Top Threats and Key Defenses
sponsored by TierPoint
WHITE PAPER: Download this white paper for the top threats in cloud security and how a cloud-based security service provider can help you defend against them.
Posted: 22 May 2019 | Published: 22 May 2019

TierPoint

The Strategic Guide to IT Security
sponsored by TierPoint
RESOURCE: New vulnerabilities emerge every day. It's critical to for organizations like yours to plan for and limit the impact of threats to data, applications, and infrastructure. Download The Strategic Guide to IT Security to learn how a Managed Security Service Provider (MSSP) can help you get started today.
Posted: 22 May 2019 | Published: 22 May 2019

TierPoint

Continuous Cyber Situational Awareness
sponsored by FireMon
WHITE PAPER: Enterprises can use continuous monitoring to determine the security posture of systems and the organization at any given moment. Organizations of all sizes should consider a comprehensive continuous monitoring strategy to decrease risk. Download this white paper to learn how you can get started.
Posted: 22 May 2019 | Published: 22 May 2019

FireMon

Red Cloak Threat Detection & Response
sponsored by Dell SecureWorks
RESOURCE: Security environments are now frustratingly fragmented. Even the most modern security stacks are a varied mix of vendors and tools. In this resource, learn how with Red Cloak Threat Detection & Response you can take security into your own hands and transform the way your security analysts detect, investigate and respond to threats.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks

State of Hybrid Cloud Security: 2019
sponsored by FireMon
RESEARCH CONTENT: This report reveals new findings from surveying more than 400 security practitioners and surfaces 3 major themes affecting hybrid cloud security: scale and complexity, lack of resources and shared security responsibility. Read on for the key facts and figures from this research.
Posted: 22 May 2019 | Published: 22 May 2019

FireMon

Driving in the Data Security Fast Lane: Secureworks Puts McLaren in Pole Position
sponsored by Dell SecureWorks
CASE STUDY: In motorsport, there are huge quantities of data being processed by engineers in the pit. Keeping this information secure and available when needed is essential. In this case study, learn how McLaren was able keep their data secure by deploying Securework's full cybersecurity platform across the organization to assess threats in real time.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks

Third-Party Cyber-Risk for Financial Services: Blind Spots, Emerging Issues & Best Practices
sponsored by BitSight
RESEARCH CONTENT: Today's complex business world means that organizations need to work with third parties. While this is critical, the exchange of sensitive information creates a new set of security risks. In this research report, explore key findings from a survey aimed to assess how financial institutions are responding to third-party cyber-risk.
Posted: 22 May 2019 | Published: 30 Apr 2019

BitSight

Cybersecurity Benchmarking & Security Performance Management
sponsored by BitSight
WHITE PAPER: A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.
Posted: 22 May 2019 | Published: 22 May 2019

BitSight

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


2018 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Verizon published its report on payment card security and compliance with the PCI DSS. Download the report now for a deep-dive into the specifics of what organizations find challenging about PCI DSS, the lessons learned from decades of dealing with compliance, and how to build a more sustainable security environment.
Posted: 22 May 2019 | Published: 22 May 2019

Verizon

Cloud Threat Report 2019
sponsored by Oracle Corporation
RESEARCH CONTENT: The Oracle and KMPG Cloud Threat Report 2019 examines emerging cybersecurity challenges and risks that businesses are facing as they embrace cloud services at an accelerating pace. Read on for important insights and recommendations on how to approach the real security risks that the cloud can present.
Posted: 21 May 2019 | Published: 21 May 2019

Oracle Corporation

Empower your IT Teams with Security-as-a-Service Offerings
sponsored by TierPoint
ANALYST REPORT: In this Forrester Opportunity Snapshot, discover findings from organizations' approaches to the security implications of multi-cloud environments, as well as the benefits they saw with their approaches.
Posted: 21 May 2019 | Published: 21 May 2019

TierPoint

How to Survive Advanced Targeted Attacks
sponsored by enSilo
CASE STUDY: Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.
Posted: 21 May 2019 | Published: 21 May 2019


8 Essential Elements of a Comprehensive IT Security Strategy
sponsored by Involta
WHITE PAPER: IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Simplify and Secure all Privileged Access with Agentless MFA
sponsored by Silverfort
PRODUCT OVERVIEW: With all privileged accounts and assets centrally managed by the CyberArk Privileged Access Security solution, it's critical to ensure that only authorized users can access and utilize them. Download this solution brief to learn about the benefits of Silverfort and CyberArk integration today.
Posted: 21 May 2019 | Published: 21 May 2019

Silverfort

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

Instant Security Maturity Assessment
sponsored by CrowdStrike
RESOURCE: In this resource, learn about CrowdStrike's Falcon Complete which fuses machine intelligence with human intervention to prevent breaches. Falcon Complete operationalizes your organization against malware, ransomware and fileless attacks. Download the resource to explore the benefits.
Posted: 21 May 2019 | Published: 21 May 2019

CrowdStrike

Secureworks Red Cloak Threat Detection and Response Application
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, and compromise IT assets. This is where threat detection and response come into play. The tools used for these tasks are referred to as security analytics and operations. In this research report, explore the state of the security analytics and operations market.
Posted: 21 May 2019 | Published: 31 May 2019

Dell SecureWorks

Stripping The Malware Threat Out Of Powershell With Ensilo
sponsored by enSilo
WHITE PAPER: While intended for system administration and the automation of daily maintenance and management tasks, PowerShell has become a preferred tool for cybercriminals. In this white paper, learn more about how PowerShell is being leveraged by cyberattackers and how enSilo can protect your endpoints against this increasing threat.
Posted: 21 May 2019 | Published: 04 Apr 2018


9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Critical Capabilities for Cloud Access Security Brokers
sponsored by Mitigate Solutions - Gartner
ANALYST REPORT: Download this Gartner report to see how CASB vendors like Bitglass, McAfee, Symantec, Oracle and more compare so you can find the best one to protect your organization.
Posted: 20 May 2019 | Published: 20 May 2019

Mitigate Solutions - Gartner

Reducing Email Security Costs
sponsored by Mitigate Solutions - Mimecast
WHITE PAPER: Download this solution brief to learn how Mimecast Email Security can help protect your organization's employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance.
Posted: 20 May 2019 | Published: 20 May 2019

Mitigate Solutions - Mimecast

The Present and Future of Security Operations
sponsored by Splunk
WHITE PAPER: In this white paper, learn about several technologies, processes, and philosophical trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy.
Posted: 20 May 2019 | Published: 31 Mar 2019

Splunk
26 - 50 of 3086 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement