IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 3384 Matches Previous Page  |  Next Page
Revolutionizing Cybersecurity
sponsored by Forcepoint
WHITE PAPER: This in-depth white paper offers strategies for organizations to revamp their cybersecurity and implement a zero-trust approach. Some topics include how to make SASE a board-level priority, how to solve the trust dilemma and more. Open now to take a look.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
Forcepoint

Adopting a Strategic Mindset for Cloud-Native Application Protection
sponsored by AWS Checkpoint
WHITE PAPER: As cloud-native applications become more and more of the norm, it’s not just developers who need to keep up. Security teams must adopt a strategic mindset for cloud-native application protection—one that prioritizes threat visibility, automation, and container security. Learn how to adopt the right security-forward mindset in this guide.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
AWS Checkpoint

Cloud Security: A Buyer's Guide
sponsored by Forcepoint
BROCHURE: The cloud security market boasts an overwhelming array of features, vendors and offerings. To help break up the noise, this Cloud Security: Buyer's Guide offers 15 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization – read on to get started.
Posted: 22 Feb 2021 | Published: 06 Nov 2020

Forcepoint

Solution Brief: Malwarebytes Endpoint Detection and Response
sponsored by Malwarebytes
DATA SHEET: Endpoints have never been under greater threat: Attacks have doubled, false positives are skyrocketing and the complexity of EDR solutions is putting a strain on endpoint security. You can combat these issues with endpoint security that’s integrated, proactive and continuous. Check out this white paper to examine easy, effective, efficient EDR.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

Solution Brief: The Value of Multi-Vector Protection on the Endpoint
sponsored by Malwarebytes
WHITE PAPER: Today cybercriminals have moved to a multi-vector attack approach. It combines a mixture of social, malware, and hacking, which represent the triple threat in their multi-vector attack technique. And it's working. This means your endpoint security must protect from all 3. Read on to learn about a single solution for these multi-vector attacks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

SonicWall Secure SD-Branch
sponsored by SonicWall
DATA SHEET: Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

SonicWall

6 Ways BAS Increases Cybersecurity ROI
sponsored by Cymulate
WHITE PAPER: This white paper outlines 6 ways that BAS can increase your cybersecurity ROI. Download the PDF to get started.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

TOPICS:  Security
Cymulate

Automated Endpoint Incident Response: An Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Explore the current market influences that impact the need for automated cyber response and the key methods that can be adopted to compress response times.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

Malwarebytes

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Improve Threat Resolution Cycles by Leveraging DNS
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

Managing Cybersecurity Risk in the Supply Chain
sponsored by Clearswift
EGUIDE: Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Clearswift

The State Of Application Security, 2020
sponsored by F5 Networks
ANALYST REPORT: Once again, applications are the leading attack vector in security breaches. The best way to protect your business from these attacks is to embrace automation in testing and remediation. Explore how in Forrester’s State of Application Security report.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

F5 Networks

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

Tips And Tricks On Safeguarding Your Data In The Cloud
sponsored by Atlassian
VIDEO: This webinar, Tips And Tricks On Safeguarding Your Data In The Cloud, highlights the top cyberthreats, compliance challenges, and industry best practices as they related to protecting your cloud-native data – watch now to get started.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021

Atlassian

How to address Phishing, Business Email Compromise, Account Takeovers & More
sponsored by Trustwave
RESEARCH CONTENT: The traditional notion of a perimeter is almost non-existent. Instead, today’s cybercriminals are targeting organizations where the people, and data, exist. Read this Osterman Research paper to discover today’s most demanding cyberthreats and the best practices required to defend against them.
Posted: 17 Feb 2021 | Published: 31 Aug 2019

Trustwave

Trend Micro Cloud One for Workload Security
sponsored by Trend Micro
DATA SHEET: Optimizing and securing workloads has become a more complex task as server workloads move towards cloud environments, virtual servers and even containers. Read this data sheet to see how Trend Micro’s Cloud One can help organizations meet these 4 key business imperatives and ensure security for physical, virtual, cloud and container workloads.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

Trend Micro Cloud One: Application Security
sponsored by Trend Micro
DATA SHEET: As reliance on business applications grows, it becomes increasingly critical to ensure each app and API is adequately protected and accounted for. Read this data sheet to see how Trend Micro’s Cloud One offering thwarts today’s application-specific cyberthreats.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

The 5 Critical Steps in Your Endpoint Security Strategy
sponsored by BeyondTrust Corporation
WHITE PAPER: Learn about the security risks and challenges to securing endpoints, the 5 essential pieces of a modern endpoint security program and how modern endpoint security solutions reduce risk and work together as part of a holistic strategy.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

BeyondTrust Corporation

Mitigate Cyber Risk by Attacking Like the Bad Guys
sponsored by Randori
ANALYST REPORT: Tap into this ESG report to learn how you can incorporate an attacker’s perspective into your overall cyber risk assessment to more effectively assess the likelihood of an attack.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Randori

The Evolution of Security Operations and the Contemporary State of Play
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.
Posted: 17 Feb 2021 | Published: 31 Aug 2020

Kaspersky

Using Compliance Budgets to Build a Red Team Capability
sponsored by Randori
WHITE PAPER: In this white paper, learn how a red team solution can validate what’s working and what needs to be addressed at your organization.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

TOPICS:  Security
Randori

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 17 Feb 2021 | Published: 31 Jul 2020

Kaspersky

Security White Paper: Data Security is Serious Business.
sponsored by Alchemer
WHITE PAPER: The digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alchemer

Expand your Endpoint Security without Expending Resources
sponsored by Kaspersky
DATA SHEET: Now that the security perimeter is disappearing, integration can become a part of security stacks everywhere. Automation is already playing its part, and with the explosion of remote work at hand, a focus on endpoint detection and response (EDR) is necessary. View this data sheet to explore Kaspersky’s multi-layer security approach.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky
51 - 75 of 3384 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info