IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 3066 Matches Previous Page  |  Next Page
TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification
sponsored by TITUS
WHITE PAPER: One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.
Posted: 15 May 2019 | Published: 09 Nov 2018

TITUS

Security Automation with Ansible
sponsored by Red Hat
WEBCAST: Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.
Posted: 15 May 2019 | Premiered: May 15, 2019

Red Hat

Security Challenges for State and Local Government IT Departments
sponsored by Dell EMC
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 15 May 2019 | Published: 15 May 2019

Dell EMC

IT Transformation Challenges and How to Address Them
sponsored by Dell EMC
WHITE PAPER: Read this article to learn how you can overcome such challenges by providing employees with the tools they need to make more informed decisions and work more efficiently.
Posted: 15 May 2019 | Published: 15 May 2019

Dell EMC

Understanding Human Behavior to Reduce Risk
sponsored by Forcepoint
WEBCAST: New technologies have changed the way we interact with our data and rendered the old threat-centric security model obsolete. It has also made it much harder to identify good and bad behavior leading to an ambiguous "gray space". In this webcast, learn how adopting a human-centric approach can give IT visibility into the gray space and reduce risk.
Posted: 14 May 2019 | Premiered: May 14, 2019

Forcepoint

Protecting Against Threats with Updated Application Security Testing
sponsored by WhiteHat Security
ANALYST REPORT: In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.
Posted: 14 May 2019 | Published: 14 May 2019

WhiteHat Security

A Guide to Achieving SaaS Security and Compliance
sponsored by Forcepoint
WHITE PAPER: The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

Real-Time Mainframe SIEM 101
sponsored by BMC
WHITE PAPER: SIEM systems have been the industry standard for enterprise network security, but the mainframe has been left out of this predominantly distributed discipline. In this white paper, learn how to launch a mainframe SIEM initiative. Also explore 4 steps to ensure malicious mainframe activity triggers a notification to the appropriate security system.
Posted: 14 May 2019 | Published: 14 May 2019

BMC

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018

Forcepoint

Exploring the Gray Space of Cybersecurity with Insights from Cognitive Science
sponsored by Forcepoint
WHITE PAPER: Cybersecurity is traditionally very good at identifying activities that are black or white—either obviously bad or clearly good. But there is a wide "gray space" between black and white, full of activities that are less clear. In this white paper, learn how to determine the best course of action in ambiguous scenarios.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell EMC
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 14 May 2019 | Published: 14 May 2019

Dell EMC

Magic Quadrant for Application Security Testing
sponsored by Synopsys
ANALYST REPORT: In this Gartner Magic Quadrant report, discover 11 AST vendors and how they stack up. Some of these vendors include, Synopsys, Veracode, IBM, WhiteHat Security, and more. Read on to see how these vendors stack up.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

The CISO's Ultimate Guide to Securing Applications
sponsored by Synopsys
WHITE PAPER: In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

The Future of Digital IAM
sponsored by WSO2, Inc.
VIDEO: If you're currently evaluating an Identity solution or exploring IAM, this webinar is for you. Download now to learn about the future of IAM and its forecasted trends.
Posted: 13 May 2019 | Premiered: 13 May 2019

WSO2, Inc.

A Guide to WSO2 Identity Server
sponsored by WSO2, Inc.
WHITE PAPER: WSO2 Identity Server aims to address both API and user domains while providing an enhanced user experience as part of WSO2's open source Integration Agile Platform. Read on to learn more about the benefits and use cases of WSO2 Identity Server.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.

Top 10 Application Security Vulnerabilities for Developers
sponsored by WhiteHat Security
VIDEO: Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.
Posted: 13 May 2019 | Premiered: 13 May 2019

WhiteHat Security

Why CASB Alone Isn't Enough
sponsored by Open Systems Technologies
WHITE PAPER: Download this white paper to learn about the benefits of a complete web protection platform and why a CASB is no longer enough.
Posted: 13 May 2019 | Published: 13 May 2019


The Case for Open Source IAM
sponsored by WSO2, Inc.
WHITE PAPER: Open source IAM solutions are now gaining attention from enterprises similar to proprietary and commercial IAMs. Why? In this white paper, learn all about the benefits and use cases of open source for IAM today.
Posted: 13 May 2019 | Published: 13 May 2019

WSO2, Inc.

Top 5 Critical Alerts You Need for IT Security
sponsored by ManageEngine
WHITE PAPER: Analyzing log data and identifying which security events are of concern among thousands of routine events can be a challenge, especially if you aren't sure which events to track. In this white paper, explore a list of 5 critical events your organization should be on the lookout for.
Posted: 13 May 2019 | Published: 13 May 2019

ManageEngine

Big Data Analytics - Security and Compliance Challenges in 2019
sponsored by comForte AG
WHITE PAPER: There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.
Posted: 13 May 2019 | Published: 30 Apr 2019

comForte AG

BSE Case Study
sponsored by Forcepoint
CASE STUDY: In an attempt to strengthen its security, BSE underwent a complete revamp of all its cybersecurity systems, including DLP. In this case study, learn about BSE's experience implementing Forcepoint DLP, in order to provide end-to-end coverage across the entire network, endpoint and email.
Posted: 13 May 2019 | Published: 19 Mar 2018

Forcepoint

TechTarget Top Cloud Security Considerations for SAP Users
sponsored by Google
WHITE PAPER: Google Cloud helps SAP customers build, deploy and operate securely at internet scale. SAP users are currently looking to migrate from legacy SAP versions to the company's flagship S/4HANA platform, and do so in the cloud. Download this white paper now to see how Google Cloud addresses every security consideration that SAP users have to tackle.
Posted: 10 May 2019 | Published: 10 May 2019

Google

One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 10 May 2019 | Published: 10 May 2019

Splunk
51 - 75 of 3066 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement