IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
76 - 100 of 3371 Matches Previous Page  |  Next Page
The McGill University Health Centre (MUHC) Strengthening Its Security Posture With In-Depth Global Intelligence
sponsored by IBM
CASE STUDY: Find out how the McGill University Health Center (MUHC) responds to potential threats, and protects electronic patient information and network operations.
Posted: 02 Mar 2018 | Published: 31 Jul 2015

IBM

The Five Essential Capabilities Of An Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.
Posted: 02 Mar 2018 | Published: 02 Mar 2018

Splunk

Aggregate, Protect, Share: Technologies to Help Health IT Protect and Manage
sponsored by IBM
WHITE PAPER: Security breaches in healthcare organizations are climbing. Inside, discover why healthcare organizations must implement more comprehensive, integrated security solutions to stay compliant, and how using a single data protection infrastructure can protect data from security breaches.
Posted: 01 Mar 2018 | Published: 30 Nov 2017

IBM

Global Application and Network Security Report
sponsored by Radware
RESEARCH CONTENT: Inside Radware's 72-page Global Application and Network Security Report, security teams can use the findings and insights from this report when analyzing the threat landscape and design security strategies to protect their enterprises.
Posted: 01 Mar 2018 | Published: 01 Mar 2018

Radware

How the Cloud Enables Digital Transformation
sponsored by Microsoft
WHITE PAPER: Download this white paper to discover how the cloud empowers organizations of all sizes to more effectively bring together people, data, and processes. See how the cloud can help your organization enhance communication, security, and productivity.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Microsoft

Zero-Day Malware Protection for the Enterprise Network
sponsored by Radware
RESOURCE: Nearly 50% of malware targeting enterprises are zero-day exploits that are not recognized by existing signature-based defenses. Tap this resource to learn how to defend against zero-day malware by integrating machine learning algorithms into existing protection mechanisms and defense layers.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Radware

Visibility, Detection and Control for Building Automation
sponsored by SecurityMatters
RESOURCE: How are you gaining visibility and remaining secure within your networks? Utilize this resource to learn how to gain full visibility into building automation networks and detect threats before they lead to operational or cyber incidents.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

SecurityMatters

Mobile security moving to a unified approach
sponsored by ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

ComputerWeekly.com

The Truth About Cloud Contact Center Security
sponsored by West UC
WHITE PAPER: For the modern contact center, security is still the biggest barrier to adoption of a cloud-based strategy. To ease your concerns, this white paper debunks 5 common network security myths and helps you build a secure cloud contact center.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

West UC

Security Tools: An Attacker's Dream Come True
sponsored by enSilo
RESOURCE: Although security tools provide protection, they are intrusive by nature and can often act as a double-edged sword. This resource examines vulnerabilities and risks posed by security tools as well as practical steps CISOs and their teams can take to protect their networks.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Nuix

Top 9 DDoS Threats Your Organization Must Be Prepared For
sponsored by Radware
RESOURCE: Utilize this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Radware

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015

Nuix

Phoenix Contact's mGuard Integration with SilentDefense
sponsored by SecurityMatters
RESOURCE: This resource uncovers the key benefits of the integration of mGuard and SilentDefense to make industrial networks more resilient to cybersecurity threats and enable users to quickly identify and react to network malfunctions.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

SecurityMatters

Industrial Networks Visibility & Control
sponsored by SecurityMatters
RESOURCE: To defend control networks, it is imperative to monitor network and process operations to detect dangerous messages. Leverage this resource to gain full visibility and control over industrial networks, while protecting from unauthorized access.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

SecurityMatters

2017's 5 Most Dangerous DDoS Attacks & Steps to Mitigate Them
sponsored by Radware
RESOURCE: Learn the 5 most dangerous attacks in 2017 and the steps to protect your organization's network.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Radware

WAF and DDoS: Perfect Bedfellows
sponsored by Radware
RESOURCE: This resource explains how DDoS and WAF strategies should be integrated together to improve attack mitigation capabilities while maintaining customer expectation.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

Radware

Image Overload: How the Growth in Imaging Volume is Changing Radiology
sponsored by Merge, an IBM Company
RESOURCE: Find out why the nature of medical imaging is changing along with the growing demand for radiologists, escalating workloads, and more.
Posted: 23 Feb 2018 | Published: 22 Feb 2018

Merge, an IBM Company

3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER: In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018

Illusive Networks

The Mystery of the APT
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Kaspersky Lab

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Why a Unified Approach to IT and OT Network Security is Critical
sponsored by Skybox Security
WHITE PAPER: One of the biggest security challenges organizations are struggling with is limited visibility of the IT-OT attack surface. This white paper examines the challenges, implications and benefits of a unified approach to managing security in converged IT and OT networks.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Skybox Security

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
RESOURCE: This infographic summarizes key findings of the 2017 Ponemon Juniper Report detailing why automation technologies are joining forces with current security strategies.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Juniper Networks

Security and the de-Commoditization of Data
sponsored by Juniper Networks
WEBCAST: According to recent reports, 81% of breaches involve stolen or weak passwords. In this webcast, learn how to prevent a security attack and protect your organization from a data breach.
Posted: 20 Feb 2018 | Premiered: Sep 30, 2017

Juniper Networks

Ransomware Response Guide: IBM Incident Response Services
sponsored by IBM
RESOURCE: Learn more about how your organization can maintain the current antivirus or endpoint protection, and the steps you can take if you are experiencing a ransomware incident.
Posted: 28 Feb 2018 | Published: 31 Dec 2017

IBM
76 - 100 of 3371 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement