IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
26 - 50 of 3692 Matches Previous Page  |  Next Page
Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

The New Economy
sponsored by Armor
WHITE PAPER: In this year’s Dark Market Report, Armor’s security team takes a closer look into the activities occurring in underground cybercrime communities, such as emerging threats, hacker price lists, trending attack vectors, and more – read on to explore the complete findings from the Armor security team.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

Armor

Critical Considerations for Securing Hybrid and Hyperscale Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Modern hybrid and hyperscale data center architectures must include security that can keep pace. But in many of these data center environments today, traditional network security solutions underperform and underserve, forcing compromises on either security or performance. Read this checklist to learn how you can work around this issue.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER: Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Operational Cost, Security-Related Risk: Quantifying the Value of Network Security Policy Management
sponsored by FireMon
ANALYST REPORT: Manual management of network security policies, rules and configurations is time-consuming and error-prone, and it adds both operational cost and increased security-related risks — especially as your IT infrastructure grows more complex. Read this analysis quantifying the value of a policy management solution.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

FireMon

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

From Reactive to Proactive: Keys to Shifting Your Cybersecurity Strategy
sponsored by Dell SecureWorks
WHITE PAPER: A constant state of readiness is crucial when it comes to cybersecurity. Senior leaders who embrace this ethos stand a much better chance of minimizing the damages, risks, and costs than leaders who have no plan and respond to threats reactively. How do you take on this stance? Read this white paper to learn 4 keys to security proactivity.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

You’ve Been Compromised: Now What?
sponsored by Dell SecureWorks
WHITE PAPER: Smart cybersecurity operations require extensive preparation and planning. Without them, organizations run the risk of poorly coordinated incident response (IR) activities that could cause more damage than the compromise itself. So how do you respond the right way? Read this white paper to get the answer.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Dell SecureWorks

The Future of Remote Work: Securing A Distributed Workforce
sponsored by VMware International Unlimited Company
RESOURCE: Nearly all non-essential employees have been working remotely since March, a trend that is likely to continue for the foreseeable future. To help organizations acclimate, VMware offers their Carbon Black Cloud tool, which looks to consolidate and unify security efforts across all control points – read on to explore the key features.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

Is Your Enterprise Network Future Ready?
sponsored by VMware
WHITE PAPER: To keep up with the rapid pace of their businesses, many organizations have adopted a multi-cloud strategy. However, complexity can add up quickly. In this white paper, learn how building a foundation of consistent networking and security across clouds can help simplify multi-cloud operations.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware

On-Demand Webinar: The Importance of Cloud Governance
sponsored by Concourse Labs
WEBCAST: Automated cloud governance is emerging as one of the most effective ways organizations can ensure security and compliance at scale as they migrate towards cloud environments. Watch this webinar to learn more about the importance of cloud governance, its role in digital transformation, and more.
Posted: 21 Oct 2020 | Premiered: Oct 21, 2020

Concourse Labs

The Six Steps to Effective Cloud Governance
sponsored by Concourse Labs
WHITE PAPER: Without effective cloud governance, cloud migrations would present disastrous security risks – threatening an organizations financial health, regulatory compliance and reputation. This eBook provides 6 regimented steps to help organization achieve effective cloud governance.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Eliminate Infrastructure as Code Vulnerabilities at the Source
sponsored by Concourse Labs
DATA SHEET: Download this brief for the key risks associated with Infrastructure as Code (IaC) and get practical tips for demonstrating your cloud security and compliance posture, at every point in time.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Top 10 Security Events to Monitor in Azure AD and Office 365
sponsored by Quest
EBOOK: Microsoft reports that 95 million active directory (AD) accounts are the target of cyberattack each day, and 1.2 million Azure AD accounts are compromised each month. To avoid breaches, you must keep an eye on changes to roles, groups, applications and more. Read this e-book to learn the top 10 events that Azure AD and O365 admins track closely.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Quest

Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of Mimecast’s email authentication offering.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Automated Cloud Governance: The ONUG Collaborative
sponsored by Concourse Labs
WHITE PAPER: As organizations continue to embrace cloud capabilities, ensuring security and governance across these new environments becomes more important than ever. This e-guide provides a comprehensive overview of the most effective way to achieve automated cloud governance (compliance & security at the speed of DevOps) – read on to get started.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

McAfee MVISION Insights
sponsored by McAfee
DATA SHEET: Enterprises have reacted to the evolution of cyberthreats by increasing security budgets and adopting siloed threat intelligence platforms, but neither of these strategies has offered the desired results. They both require rigorous human intervention and produce only limited actionability. Read this white paper for an alternative approach.
Posted: 21 Oct 2020 | Published: 31 Jul 2020

McAfee

How Cyberattackers Evade Threat Signatures
sponsored by Vectra AI
EBOOK: Attackers can easily create and hide their exploits in an infinite number of ways. Consequently, the limitations of signatures should be complemented with automated threat management models. Download this e-book to learn more about how Network Detection and Response (NDR) can mitigate the network threat before damage is done.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Vectra AI

A Buyers’ Guide to SecOps
sponsored by VMware International Unlimited Company
EGUIDE: Endpoint detection and response (EDR) tools are emerging as a prominent figure in protecting an organization’s endpoints. Similarly, SecOps tools are quickly becoming critical in ensuring security across the DevOps lifecycle. Read this buyers’ guide for an overview of how to evaluate and select the right tool and vendor.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

VMware International Unlimited Company

The Cost of Making the Front Page: What You Need to Know About the Growing Threat of Public Breaches
sponsored by Dell SecureWorks
WHITE PAPER: A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Dell SecureWorks

Analyst Report: Concourse Labs is Shaping the Cloud Governance Market
sponsored by Concourse Labs
ANALYST REPORT: With cloud growing in popularity, organizations need a way to ensure they meet security and governance requirements in their new environment – which led to the inception of the cloud governance market. Read this analyst report for 451 Research’s evaluation of Concourse Labs’ cloud governance offering.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

How to Consolidate Your Cybersecurity Stack
sponsored by Dell SecureWorks
WHITE PAPER: As a result of rapid innovation by threat actors in the past decade, the number of layers in the average cybersecurity stack is now up to 47. This number wouldn’t seem so horrible if these tools worked well together, but they don’t. It may be time to consolidate your cybersecurity. Read this white paper to learn the framework for doing so.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Dell SecureWorks

Beyond the Perimeter- The Need for Pervasive Email Security
sponsored by Mimecast
ANALYST REPORT: Organizations are having a hard time protecting against modern email threats, especially since the move to cloud-delivered email systems. Mimecast’s Email Security 3.0 Strategy can help provide a more comprehensive email security solution.
Posted: 21 Oct 2020 | Published: 29 Feb 2020

Mimecast

Seven Strategies to Securely Enable Remote Workers
sponsored by BlackBerry
WHITE PAPER: Remote work is becoming a "must-have" job requirement, and security architectures and network protocols are changing as a result. New security methodologies, like zero trust, are being more heavily considered, and network professionals must work to ensure productivity from anywhere. Read this white paper to learn 7 strategies for remote enablement.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

BlackBerry

Managing Digital Risk: The Security Challenge Beyond Your Perimeter
sponsored by Mimecast
WHITE PAPER: Today’s security leaders are feeling the pressure that cyber risks presents to their organization’s reputation. But managing digital risk can sometimes be resource exhaustive. Read this Mimecast guide for an overview of modern challenges and how to overcome them.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Mimecast
26 - 50 of 3692 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info