IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 3599 Matches Previous Page  |  Next Page
Thales Data Protection on Demand
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, take a closer look at the key features of Thales’ Data Protection on Demand, a cloud-based platform that provides a wide range of cloud hardware security module (HSM) and key management services – designed to simplify security, improve protection capabilities and reduce cost. Read on to learn more.
Posted: 10 Sep 2020 | Published: 30 Apr 2020

Thales

Enterprise Key Management Solutions
sponsored by Thales
WHITE PAPER: In order to meet encryption needs, organizations often create multiple, independent encryption systems – which results in fractured silos and can lead to security complications. In this resource, take a closer look at Thales’ various key management offerings and discover the capabilities of each function.
Posted: 10 Sep 2020 | Published: 31 Aug 2020

Thales

Privacy Laws, Consumer Rights and the ServiceNow Solution
sponsored by Covestic
EBOOK: The growing concern over privacy has led to the increase of data privacy laws – but amid this global trend, it can be difficult to keep track of the requirements of each law. Luckily, this eBook provides an overview of the common themes seen across each law and takes a closer look at a few key regulations – both in the US & abroad.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Covestic

Complete Endpoint Protection
sponsored by Cybereason
DATA SHEET: In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet

Emerging Technologies for the New Workplace E-Guide
sponsored by AVI-SPL
EBOOK: AVI-SPL shares insights into solutions and practices that will shape the workplace experience in the post-COVID-19 world, as well as how to prepare for the next disruption, and create a safe environment that attracts and maintains top talent. Get the e-guide now.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

AVI-SPL

Technology Insight for Software Composition Analysis
sponsored by Sonatype
ANALYST REPORT: In this exclusive Gartner report, learn how security and risk management teams can better account for open-source security. The report explores 5 key findings on open-source security and provides 4 concrete recommendations on where security leaders can start.
Posted: 10 Sep 2020 | Published: 01 Nov 2019

Sonatype

SASE: Explore the Emerging Technology
sponsored by TechTarget
RESOURCE: Enterprise networking technologies and architectures are evolving quickly and Secure Access Service Edge (SASE) is climbing up in the hype cycle. Although we don't expect you to be investing in SASE today, you need to understand what it is. After completing our WAN survey, unlock access to our new guide to learn everything you need to know.
Posted: 09 Sep 2020 | Published: 10 Sep 2020

TechTarget

Protect Your Sensitive Data
sponsored by Thales
EGUIDE: When it comes to integrating a data protection solution, there are several considerations organizations need to understand prior to choosing a partner, namely – are you looking to protect data at rest, data in motion or both? Read on to unlock a step-by-step guide to finding the right data protection solution for your organization.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Thales

How to Eliminate Security & Compliance Impediments on Your Journey to the Cloud
sponsored by AWS - Anitian
VIDEO: In this webcast, learn the business, security, and DevOps benefits of automating security, get an inside look at security automation and how it helps DevOps teams, and discover how to achieve the fastest time-to-market possible on AWS by leveraging cloud security & compliance automation.
Posted: 09 Sep 2020 | Premiered: 03 Sep 2020


DevOps at ABN AMRO: Securing your Software Supply Chain
sponsored by Sonatype
WEBCAST: Everyone has a software supply chain—even if you don’t call it that. In this resource, join Stefan Simenon, Head of Center of Expertise Software Development and Tooling at ABN AMRO, as he explores why the industry is so reliant on the software supply chain—and how your business can strengthen security across it.
Posted: 09 Sep 2020 | Premiered: Sep 9, 2020

Sonatype

Mitigating Application DDoS Attacks
sponsored by F5 Networks
WEBCAST: Your network, DNS & TLS are not often thought of as being part of applications. Yet DoS or DDoS attacks against these tiers can render your networks, apps or other supporting infrastructure inaccessible. The challenge is identifying & blocking attackers’ requests whilst still allowing clean traffic. View this webinar to learn how to do this.
Posted: 08 Sep 2020 | Premiered: Sep 8, 2020

F5 Networks

The Three Mega Trends CISOs Need to Watch
sponsored by Hyperproof
EGUIDE: Today’s CISO faces pressure on many fronts – an expanding threat landscape, an exponentially growing volume of data and increasingly stringent data privacy laws. Read this guidebook to discover how CISOs can navigate and manage each of these challenges, and more.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Hyperproof

What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER: For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020

Proofpoint

Evolving DevOps to support security – perspectives from the Puppet Labs State of DevOps report
sponsored by ServiceNow
WHITE PAPER: In this State of DevOps report, explore recent research findings from Puppet Labs and ServiceNow as they home in on DevOps trends with an emphasis on security. Read the key takeaways here.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

ServiceNow

Own and Manage Your Encryption Keys
sponsored by Thales
WHITE PAPER: As organizations migrate their data to the cloud, encryption strategies need to be revised to reflect the needs of the changing environment. In this white paper, discover the importance of data encryption, the importance of encryption key ownership, and how all of it affects the security of your company’s cloud-native data.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Thales

Pragmatic Zero Trust
sponsored by Capgemini
RESOURCE: There is no consistent view of what ‘zero trust’ means in practice, particularly now that vendor marketing teams have the term firmly within their sights and intend to label everything ‘zero trust’ as a result. Read this short blog post to cut through the marketing hype and learn the history, nature, and possible future of ‘zero trust.’
Posted: 08 Sep 2020 | Published: 23 Jan 2020

Capgemini

Encrypted DNS - Mitigating the Impact of DoT and DoH for Service Providers
sponsored by F5 Networks
WEBCAST: DNS is fundamental to how the internet functions, but growth in DNS encryption potentially renders DNS infrastructure redundant. As a result, service providers will need to understand the challenges and opportunities of encrypted DNS. Jump into this webcast to cover the impact of encrypted DNS from the service provider's perspective.
Posted: 08 Sep 2020 | Premiered: Sep 4, 2020

F5 Networks

4-step Work From Home Guide
sponsored by HCL Software
WHITE PAPER: When a crisis manifests, organizations need to respond quickly or risk insolvency. CISOs and security teams must continue to protect sensitive data while teleworking, and IT and security operations must work together to patch and remediate vulnerabilities. Read this BigFix white paper to learn the 4 core capabilities to support secure telework.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

HCL Software

Cloud Pak for Security Demo Video
sponsored by IBM
VIDEO: IBM Cloud Pak for Security streamlines threat management with one unified console and an intuitive user experience. Watch this demo video of the IBM Cloud Pak for Security platform from a security analyst's point of view.
Posted: 05 Sep 2020 | Premiered: 27 Aug 2020

IBM

Multi-Layered Approach to Security with Power9
sponsored by IBM
WHITE PAPER: As hackers grow more sophisticated, securing your IT infrastructure has become more and more complex.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

IBM

Technology Supporting People
sponsored by Advizex
CASE STUDY: In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Advizex

The Most Creative Fake Login Pages Against The Biggest Brands In Tech
sponsored by Ironscales
EBOOK: Take a look at the most creative fake login pages against the biggest brands in tech to see if you can spot if they’re phishing or real.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Ironscales

3 Enterprise Cybersecurity Resolutions For 2020
sponsored by Capgemini
RESOURCE: In this article, revisit 3 enterprise cybersecurity resolutions made back at the beginning of 2020 which outline best practices for security leaders for the new year as well as the new decade. Read on for a full overview of each resolution.
Posted: 04 Sep 2020 | Published: 03 Jan 2020

Capgemini

The CIO’s Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.
51 - 75 of 3599 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info