IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 3405 Matches Previous Page  |  Next Page
Global Threat Report
sponsored by MobileIron
WHITE PAPER: Mobile threats exist on many different levels across devices, networks and applications. Download this white paper to learn about some of the most recent mobile threats and how you can protect your organization.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

MobileIron

Data Sheet: Clearpass Onboard
sponsored by Aruba Networks
RESOURCE: Mobile devices are changing how organizations approach network security protocols. In this resource, find out why organizations are switching to network policy management tools like Aruba ClearPass Onboard to help secure BYOD.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

Aruba Networks

Personal Data Protection: Enabling Compliance with GDPR
sponsored by SAS
RESOURCE: Protecting personal information and consumer integrity has become a high priority for the EU and a result, the GDPR was created. This resource outlines GDPR challenges, new compliance requirements, and 5 steps to evolve current data protection and compliance strategies.
Posted: 21 Mar 2018 | Published: 31 Dec 2016

SAS

Top Global Research Laboratory Resolves Security Incidents Faster
sponsored by IBM Resilient
CASE STUDY: To manage today's threats, organizations need a proven and robust incident response (IR) function. Explore this case study to gain insight into how a top global research laboratory overcame the issue of an inadequate IR ticketing system; it lacked flexibility, control, and security analytics.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

IBM Resilient

Protect Your Data at Every Point Possible
sponsored by Dell EMC and IntelĀ®
RESOURCE: The average annual cost of data loss is nearly $1 million, according to Dell EMC research. Take a look at this infographic to uncover how to protect your data at every point possible in the shifting IT landscape.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

Dell EMC and IntelĀ®

Assessing Cybersecurity Success
sponsored by ConvergeOne
WHITE PAPER: How does your organization measure success of cybersecurity? This resource offers a simple and clear way to review and assess your current information security program.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

ConvergeOne

Incident Response Platform vs. Ticketing System: Why Security Teams Need Purpose Built Technology
sponsored by IBM Resilient
RESEARCH CONTENT: Cybersecurity incident response is imperative in this decade of constant attacks. This Gartner research report explores the differences between incident response platforms vs. ticketing systems and explains the risks and limitations of using a ticketing system for purposes beyond what it was built to do.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: How does your organization plan to respond to complex cyber threats? Learn how an incident response platform can significantly drive down the mean time to find, respond to, and remediate incidents.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

GDPR: What it Means and How to Get Compliant
sponsored by SAS
RESOURCE: GDPR will require an ongoing, organization-wide focus to ensure you protect your customers' personal data. Any organization that does not comply could be fined up to $22 million, or 4% of their global annual revenue (whichever is greater). Access this 5-step checklist to learn how to stay GDPR-compliant.
Posted: 19 Mar 2018 | Published: 31 Dec 2017

SAS

Why Many Cloud Communications Providers Don't Like to Talk About Security, Compliance and Reliability
sponsored by 8x8, Inc.
WHITE PAPER: Learn how security, compliance and reliability are just as important for business communication systems and 10 tough questions you should ask your communications provider today.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

8x8, Inc.

The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast, Enza Iannopollo, security & risk analyst at Forrester Research, demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

The Mobility Landscape: Goals and Challenges
sponsored by MicroStrategy Incorporated
WHITE PAPER: Download this white paper for an outline of the mobility landscape, businesses top goals for mobility initiatives, and how to minimize the challenges to mobility.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

MicroStrategy Incorporated

10 benefits of data mining and predictive analytics
sponsored by MicroStrategy Incorporated
ANALYST REPORT: Learn how you can extend the benefits of data science, machine learning, and predictive analytics, and the challenges that companies are facing with these plans.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

MicroStrategy Incorporated

Enabling Network Visibility and Dynamic Threat Migration
sponsored by Big Switch Networks
RESOURCE: In this technology overview, learn how a programmable SDN controller can help IT teams gain clear visibility into their network while addressing the challenges associated with traditional network security deployment options.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Big Switch Networks

10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

8 Point Mobility Checklist
sponsored by Fujitsu
RESOURCE: In today's digital-first world, mobile computing and modern communications are changing the way educational institutions operate. Securely integrating new devices into your existing mobility strategy can be difficult and time consuming. Download this 8 point checklist to ensure a successful mobility strategy for educators.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Fujitsu

Data Classification Services and Keeping Cloud Data Secure
sponsored by Data443
EGUIDE: In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.
Posted: 12 Mar 2018 | Published: 31 Aug 2016

Data443

GDPR Looms with Organizations Still Unprepared
sponsored by Data443
EGUIDE: GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

Data443

Magnify Traffic Visibility for Security in VMware Networks
sponsored by APCON, Inc.
RESOURCE: Learn how to coordinate and architect network traffic monitoring in a VMware environment to improve security.
Posted: 12 Mar 2018 | Published: 29 Dec 2017

APCON, Inc.

Enhance Security with Virtual Traffic Monitoring
sponsored by APCON, Inc.
RESOURCE: In this resource, learn from Jeremy Castile, Product Marketing Manager at APCON about how to meet network traffic monitoring and security needs in a cloud-based architecture.
Posted: 12 Mar 2018 | Published: 27 Nov 2017

APCON, Inc.

SCADA in the Age of Cyber-Security
sponsored by Radware
EBOOK: In this e-book, learn about the 3 critical strategic and tactical security challenges that new technologies such as IoT devices have opened SCADA environments up to, as well as the tools you can use to meet them head-on.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Radware

Accelerate Cloud Transformation
sponsored by Cloud Spectator, LLC
WEBCAST: Watch this video for a comprehensive cloud readiness framework to help map out where your organization stands and accelerate your transformation to the cloud.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Cloud Spectator, LLC

How to Keep Your Containers Secure
sponsored by Aqua Security
WEBCAST: In a containerized deployment, how do you safely pass secrets - like passwords and tokens - between containers without compromising their safety? Watch this webcast to uncover the risks, and learn best practices for keeping your secrets secure.
Posted: 09 Mar 2018 | Premiered: Sep 28, 2017

Aqua Security

Empower and Protect Your Organization With an End-to-End Approach to IoT Security
sponsored by VMware Pulse
WHITE PAPER: McKinsey predicts the annual economic impact of the IoT could exceed $11 trillion by 2025. This white paper reveals an end-to-end approach to protecting your organization within the age of IoT.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

VMware Pulse
51 - 75 of 3405 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement