IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
76 - 100 of 3053 Matches Previous Page  |  Next Page
Using SD-WAN to Enhance your Security Posture
sponsored by Open Systems Technologies
WHITE PAPER: The use of SD-WAN is dramatically increasing, and in many cases, it is a means of reducing network complexity that can create vulnerabilities. However, SD-WAN is just the starting point for reducing risk. Download this white paper to learn more about the benefits of secure SD-WAN today.
Posted: 09 May 2019 | Published: 09 May 2019


Why Security Matters in DevOps
sponsored by Trend Micro, Inc.
EGUIDE: DevSecOps has become an essential component to the way we develop, ship, and maintain code, but without proper security practices in place, the DevOps pipeline can lead developers to deploy compromised code. Discover why security for DevOps is so important, as well as tools that can help you build security into your DevOps pipeline.
Posted: 09 May 2019 | Published: 07 May 2019

Trend Micro, Inc.

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Cybersecurity Incident Response Services
sponsored by CrowdStrike
RESEARCH CONTENT: According to Forrester Analytics 2018 survey data, 50% of global security decision makers reported suffering at least one breach in the past 12 months. Pragmatic businesses plan for a breach. In this Forrester Wave report, explore key criteria to look for when evaluating a cybersecurity incident response service provider.
Posted: 09 May 2019 | Published: 18 Mar 2019

CrowdStrike

Cloud in the Crosshairs
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: In 2018, enterprises continued to wrestle with challenges such as ransomware, insider threats, and DDoS attacks, all while struggling to simplify operations. In this research report, explore key findings from NETSCOUT's 14th annual worldwide infrastructure security report.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

Dawn of the Terrorbit Era
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: The global cyberthreat landscape continues to evolve, unleashing increasingly sophisticated and persistent attack techniques at internet scale. In this NETSCOUT Threat Intelligence report, explore key findings.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

4 Questions to Ask E-Signature Vendors About Security to Empower Digital Transformation
sponsored by Adobe Systems Incorporated
RESOURCE: In this article, discover key questions to ask your potential e-signature vendor about product security, and review your e-signature software options with Adobe.
Posted: 09 May 2019 | Published: 09 May 2019

Adobe Systems Incorporated

Experian Identity and Fraud Report
sponsored by Experian
WHITE PAPER: While businesses strive to unlock the benefits of increasingly digital lifestyles, a growing sophistication in cyberattacks and fraud has decreased consumer trust. Read this research report to learn how to maintain consumer trust in an increasingly digital era.
Posted: 09 May 2019 | Published: 31 Dec 2018

Experian

Maximizing SOC Effectiveness and Efficiency with Integrated Operations and Defense
sponsored by NetScout Systems, Inc.
WHITE PAPER: The most successful security programs are rarely the ones with the largest security budgets or staffs. The effectiveness of security operations increases by leveraging existing resources in more productive ways. In this white paper, explore leverage areas for assuring SOC success while taking advantage of integration opportunities.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

Using Indicators to Deal with Security Attacks
sponsored by ManageEngine
WHITE PAPER: Download this white paper to understand the unique capabilities of these indicators, the differences between them, and the steps to configure a SIEM platform to detect indicators of compromise (IoCs) and indicators of attack (IoAs).
Posted: 09 May 2019 | Published: 09 May 2019

ManageEngine

CrowdStrike Incident Response and Proactive Services
sponsored by CrowdStrike
WHITE PAPER: CrowdStrike's incident response and proactive services are architected to enable organizations to quickly and effectively react to a cybersecurity incident. In this white paper, learn how CrowdStrike Services can help organizations secure and mature their security by addressing 3 fundamental questions.
Posted: 09 May 2019 | Published: 09 May 2019

CrowdStrike

Missing Cyberhygiene: Ransomware – Curse and Cure
sponsored by Open Systems Technologies
WHITE PAPER: Almost all security experts today would agree that proper internet hygiene is a key element in protecting our IT infrastructure. Yet, malware seems to have been infecting our computers at epic rates for many years. In this white paper, discover how you can combat ransomware using vulnerability management today.
Posted: 08 May 2019 | Published: 08 May 2019


Who Needs Security Orchestration, Automation and Response?
sponsored by SearchSecurity.com
EBOOK: Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.
Posted: 08 May 2019 | Published: 08 May 2019

SearchSecurity.com

State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT: Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 08 May 2019 | Published: 08 May 2019

Proofpoint

Introducing The F5 Advanced WAF
sponsored by F5 Networks
WEBCAST: The F5 Advanced Web Application Firewall (WAF) provides a set of security features that can help keep your Web Applications safe from attack. In this webcast, John Wagnon, Senior Solution Developer at DevCentral, outlines many of the key features offered in the F5 Advanced WAF.
Posted: 08 May 2019 | Premiered: Apr 30, 2018

F5 Networks

What is a Web Application Firewall (WAF)?
sponsored by F5 Networks
WEBCAST: Today, threat vectors are being introduced at all layers of the network. Therefore, it's important to defend your network with more than just a traditional firewall. That's where a Web Application Firewall (WAF) comes in. In this webcast, John Wagnon from DevCentral, outlines what a WAF is and why your web application needs one.
Posted: 08 May 2019 | Premiered: Apr 9, 2019

F5 Networks

The Evolution of Mobile Security
sponsored by Symantec
WHITE PAPER: Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.
Posted: 08 May 2019 | Published: 08 May 2019

Symantec

Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Organizations are under constant threat from a barrage of scans and attacks delivered across IP traffic. In this white paper, learn how Armor's Dynamic Threat Block (DTB) is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack.
Posted: 08 May 2019 | Published: 08 May 2019

Armor

IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: Distributed denial-of-service (DDoS) attacks are increasingly complex. Even though DDoS prevention technologies are more mainstream than a few years ago, choosing the right vendor or service is challenging. In this research report, explore an assessment of providers offering DDoS prevention and mitigation technologies and services.
Posted: 08 May 2019 | Published: 31 Mar 2019

NetScout Systems, Inc.

Hitachi ID Password Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

Integrate F5 Anti-Bot Mobile SDK with Any Mobile App
sponsored by F5 Networks
WHITE PAPER: It's now easier than ever to implement mobile security protection than ever, with a no-code mobile integration platform. Check out this quick overview to learn how to protect mobile applications from bots and automated attacks in three simple steps.
Posted: 07 May 2019 | Published: 07 May 2019

TOPICS:  Security
F5 Networks

Best Practices for Securing Privileged Access
sponsored by Hitachi ID
RESOURCE: In this resource, discover all of the key benefits and capabilities of Hitachi ID's Privileged Access Manager.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

Gauge your Data Security and Privacy Maturity
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester assessment so you can gauge where your firm is on its data security and privacy journey and discover which core competencies you need to strengthen or develop.
Posted: 07 May 2019 | Published: 07 May 2019

Akamai Technologies

Leading the Way With Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: According to the 2018 Verizon Data Breach Report, the hospitality industry is one of the top five industries subjected to network breaches every year. Learn how OpenKey, a company leading the way with secure mobile keyless hotel access, was able to securely host their customer data with a private cloud provider.
Posted: 07 May 2019 | Published: 07 May 2019

Armor

F5 Advanced WAF
sponsored by F5 Networks
PRODUCT OVERVIEW: Attackers have embraced the use of automation to scan applications for vulnerabilities, attack account credentials, or cause denial of service (DoS). However, web application firewalls (WAF) can protect your applications from data breaches. In this resource, learn how F5 Advanced WAF can help you defend against attacks.
Posted: 07 May 2019 | Published: 07 May 2019

F5 Networks
76 - 100 of 3053 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement