IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 3409 Matches Previous Page  |  Next Page
Operationalizing Privacy Policy from Discovery to Enforcement
sponsored by Ionic Security
WEBCAST: Hear from BigID and Ionic Security in this on-demand webinar to learn how you can automate the identification and mitigation of risk to personal data demanded by CCPA and GDPR.
Posted: 31 Oct 2019 | Premiered: Oct 31, 2019

Ionic Security

ML-Driven Security Analytics and Automated Threat Response for IoT Part 1
sponsored by Extreme Networks
WEBCAST: Adopting specific machine learning capabilities can help you identify & respond to threats inside your network before it’s too late. That’s where machine learning & AI can assist you with automated anomaly & threat detection analytics. Learn how this industry-unique approach can help protect your network today.
Posted: 31 Oct 2019 | Premiered: Feb 19, 2019

Extreme Networks

SSH Key Management in the Cloud
sponsored by AppViewX
WHITE PAPER: Enterprises want to keep their systems safe using SSH keys, but by failing to keep those keys secure, they are ultimately more at-risk. Without protecting their SSH keys, enterprises are as vulnerable as ever. Find out how AppViewX can help you automate SSH key management and keep them secure in the cloud and on-prem.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

AppViewX

Advanced Data Protection for Midsize Enterprises
sponsored by InteliSecure
WHITE PAPER: Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

InteliSecure

Protecting Data Capital in your Organization
sponsored by Dell EMC
EBOOK: With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

Dell EMC

Webinar: Financial Crime
sponsored by SAP Concur
WEBCAST: On Wednesday, 13 November 2019, 11:00am AEDT, join SAP Concur for a 40-minute live webinar on Fraud, Risk & Compliance and why prevention and early detection is your strongest weapon against increasingly sophisticated financial crime.
Posted: 30 Oct 2019 | Premieres: Nov 13, 2019, 11:00 EST (16:00 GMT)

SAP Concur

Why Security Architects Struggle to Manage Risk in Multi-cloud Environments
sponsored by Fortinet, Inc.
WHITE PAPER: With cloud adoption increasing, security architects must rethink their cloud management strategies. Risks can range from misconfiguration of security controls to unclear responsibilities. Continue reading to learn more about these security risks, and why they should be top-of-mind.
Posted: 30 Oct 2019 | Published: 16 Oct 2019

Fortinet, Inc.

Operational Cybersecurity for Digitized Manufacturing
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how security-related issues are driving companies to develop and adopt strategies and a governance model to address the convergence of information technology (IT) and operational technology (OT).
Posted: 29 Oct 2019 | Published: 29 Oct 2019

Fortinet, Inc.

Large Canadian Financial Institution Enhances Data Protection Strategy
sponsored by TITUS
CASE STUDY: When sensitive information gets into the wrong hands, the costs can be severe. Using techniques such as data classification and content validation can help you mitigate data loss. In this case study, learn how one of the largest Canadian financial institutions did this with TITUS Classification.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TITUS

TITUS Times: The Politics of Data Protection
sponsored by TITUS
WHITE PAPER: Most breaches that occur at the end user level aren’t malicious. The ideal security strategy addresses people, processes and policy with serious consideration given to the end user. So, rather than dictate policies, involve your end users as you develop your security strategies. Discover why it is critical to focus on the end user’s point of view.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TITUS

Jargon Buster Guide to Container Security
sponsored by ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

DevSecOps delivers better business
sponsored by ComputerWeekly.com
EGUIDE: Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

CIO Trends #8
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Are You The Weakest Link?
sponsored by Cyberfort
WHITE PAPER: Senior executives are highly-targeted individuals. They have access to the most important company data and information. This makes them the weakest link in the cybersecurity chain. In this white paper, learn why a “security-first” mentality can help defend against potential threats.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

Cyberfort

Enhancing IoT Visibility and Security
sponsored by Extreme Networks
WEBCAST: Many IoT devices were designed without imbedded security features, which is posing a security risk to many organizations. In this webcast, learn about the risks and attacks associated with IoT, how to approach IoT security, and how Extreme solutions can help.
Posted: 29 Oct 2019 | Premiered: Aug 13, 2019

Extreme Networks

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

Overcome the challenges of protecting data that is here, there and everywhere
sponsored by IBM
EBOOK: When it comes to cloud environments, whether in the public cloud or a privately hosted or hybrid environment, data security and protection controls must protect sensitive data. Read this e-book to learn how data security and protection technologies should operate in multiple environments (physical, cloud and hybrid) at the same time.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Overcome the challenges of protecting data that is here, there and everywhere
sponsored by IBM
EBOOK: When it comes to cloud environments, whether in the public cloud or a privately hosted or hybrid environment, data security and protection controls must protect sensitive data. Read this e-book to learn how data security and protection technologies should operate in multiple environments (physical, cloud and hybrid) at the same time.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

IBM Security Guardium Analyzer Overview Demo
sponsored by IBM
WEBCAST: Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.
Posted: 28 Oct 2019 | Premiered: Feb 26, 2019

IBM

IBM Security Guardium Analyzer Overview Demo
sponsored by IBM
WEBCAST: Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.
Posted: 28 Oct 2019 | Premiered: Feb 26, 2019

IBM

Forrester Encryption Podcast: You Can Never Have Too Much Encryption
sponsored by IBM
PODCAST: A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.
Posted: 28 Oct 2019 | Premiered: Oct 28, 2019

IBM

Forrester Encryption Podcast: You Can Never Have Too Much Encryption
sponsored by IBM
PODCAST: A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.
Posted: 28 Oct 2019 | Premiered: Oct 28, 2019

IBM

OnDemnd Webinar: Up, Up and Away! Best Practices for Securing Data in Hybrid Multi-Cloud Environments
sponsored by IBM
WEBCAST: Your data is moving to the cloud – that’s a given – but will it be safe once it gets there? The new reality of a hybrid, multi-cloud world complicates data protection efforts for organizations everywhere, as do new privacy and compliance mandates. In this webinar, learn how to integrate data security into your cloud strategy.
Posted: 28 Oct 2019 | Premiered: Oct 28, 2019

IBM
51 - 75 of 3409 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement