IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
76 - 100 of 3692 Matches Previous Page  |  Next Page
New Account Fraud: Uncovering the Tools And Tactics Of A New Breed Of Scams
sponsored by Buguroo
WHITE PAPER: To enhance customer experience, banks are closing branches in favor of digital services to meet the growing demand of tech-savvy users. A big risk of this change is new account fraud, which is a cyber scam where bad actors use stolen or synthetic identities to open accounts and borrow money. Read this white paper to get a closer look.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Buguroo

Unmasking BEC and EAC
sponsored by Proofpoint
EBOOK: Tap into The Complete Guide to Stopping Business Email Compromise, Email Account Compromise and Today’s Biggest Impostor Threats for concrete steps on how to keep your users safe.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Assuring the Promise of a Secure 5G Future: 5 Steps to Taming the Complexity and Exploiting 5G Opportunities
sponsored by Spirent
WHITE PAPER: 5G will radically improve mobile broadband services, enable connectivity to billions of global devices and create an IoT boom. So what’s holding up 5G deployment in real-world use cases? The answer is security – particularly in that 5G networks need to be tested and validated. Read this white paper to learn 5 steps to 5G security.
Posted: 16 Oct 2020 | Published: 31 Jul 2019

Spirent

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

Customer Series: How to go from IoT Concept to Market Rapidly with Dynamis
sponsored by Particle
WEBCAST: This webcast provides advice to help launch your idea into production using IoT. Learn common go-to-market challenges and how you can overcome them by partnering with Particle. Download the webcast now.
Posted: 16 Oct 2020 | Premiered: Oct 16, 2020

Particle

A Security Architecture for the Cloud-Centric, Digital Enterprise
sponsored by McAfee
WEBCAST: View this webinar with experts Daryush Ashjari and Tim Stead, to find out where your responsibility lies, what cloud-native threats look like, and what it takes to build a cloud-centric security architecture.
Posted: 16 Oct 2020 | Premiered: Oct 15, 2020

McAfee

Cloud Threat Investigation 101: Hunting with MITRE ATT&CK
sponsored by McAfee
DATA SHEET: Learn how to get started with cloud threat investigation using MITRE ATT&CK.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

McAfee

The New Reality
sponsored by BlackBerry
EBOOK: Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it's gaining popularity.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

BlackBerry

Remote Work is the Future
sponsored by BlackBerry
EBOOK: Remote work is quickly becoming a new reality for the foreseeable future. In this case study, discover what led ConvergeOne, a professional and managed services provider in North America, to partner with BlackBerry and explore the outcomes of their remote work project.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TOPICS:  Security
BlackBerry

SANS Using Zero Trust to Enable Secure Remote Access
sponsored by BlackBerry
WHITE PAPER: Zero trust is a model in which all assets in an IT operating environment are considered untrusted by default until network traffic and behavior is validated and approved.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TOPICS:  Security
BlackBerry

Don't Compromise on Security in a Crisis
sponsored by BlackBerry
EBOOK: Don't Compromise on Security in a Crisis. In this guide dive in and learn how organizations are trying to function safely during this COVID-19 pandemic and their work from home environment.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TOPICS:  Security
BlackBerry

Aruba 360 Secure Fabric
sponsored by TechData
DATA SHEET: Today, a number of technology disruptions – mobile, BYOD, virtualization, cloud, big data, and IoT – have rendered a perimeter-based security approach insufficient. Modern threat defense requires constant assessment of device risk with analytics-ready secure infrastructure. View this data sheet to learn about Aruba 360 Secure Fabric.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TechData

AI and Automation Address Cybersecurity Concerns
sponsored by TechData
CASE STUDY: As a school district sought to enable greater BYOD capabilities, expand remote learning, and better handle online lessons, they realized that they needed improved security capabilities. Examine this case study to see how Pearland was able to boost the security and speed of their services with the help of automation and more.
Posted: 15 Oct 2020 | Published: 17 Jan 2020

TechData

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

3 Common Kubernetes Security Mistakes and How to Avoid Them
sponsored by VMware
WHITE PAPER: Tap into this white paper to find 3 common mistakes teams make when configuring Kubernetes workloads and how to correct them.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

VMware

The Rise of APT as a Service
sponsored by Bitdefender
VIDEO: Access the Bitdefender investigation to learn the intricate details revealed into an APT attack, which targeted a company that deals with high-profile billion-dollar contracts in the real-estate industry.
Posted: 15 Oct 2020 | Premiered: 15 Oct 2020

Bitdefender

Generations of Machine Learning in Cybersecurity
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn the 5 characteristics that define a generation of machine learning and analyze the 5 generations themselves to discover how to improve future machine learning cyber security initiatives.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

BlackBerry

The 5 Phases of Incident Response
sponsored by BlackBerry
WHITE PAPER: According to an IBM study, the “vast majority” of organizations today are unprepared to respond effectively to a serious security incident. Most often, this is due to chronic resource issues and inadequate planning. Get in the know – read this white paper to learn the 5 phases of incident response and how to implement them.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

Singapore Nonprofit PPIS Secures Centers with Help from BlackBerry and Partner ACE Pacific Group
sponsored by BlackBerry
CASE STUDY: With the world having changed the way it does business, security professionals have had to place a lot of emphasis on endpoint security and, more specifically, threat detection and response. Want to learn more? View this impressive case study to learn how a nonprofit in Singapore was able to prepare for the unexpected.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

HPE Security Analysis and Roadmap Service
sponsored by TechData
DATA SHEET: In this data sheet, take a closer look at the features, benefits and limitations of HPE’s Security Analysis and Roadmap Service, including the offering’s intended use, customer responsibilities, and more – download now to get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

TechData

Behavioral Solution for Online Fraud Prevention
sponsored by Buguroo
WHITE PAPER: Buguroo was recently announced as winners of the 2020 Frost & Sullivan Best Practices Award for their innovative behavioral biometrics solution – which looks to help organizations in the banking and financial services industry detect and prevent fraud. Read this report to learn more about Buguroo’s award-winning offering.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Buguroo

Innovate with Intention: Intelligence to Guide Innovation and Manage Risk.
sponsored by Spirent
WHITE PAPER: The “innovation gap” is often the term given to the difference between an organization’s desire to innovate and their material innovation progress. This executive brief attempts to explain the reasoning for the gap by addressing common misconceptions and highlighting how security can be used to accelerate innovation.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Spirent

See and Defend Cloud Workloads with CrowdStrike and AWS
sponsored by AWS & CrowdStrike
VIDEO: Cloud security is growing more difficult as it becomes more popular, and security teams face the growing risk of addressing these challenges alongside compliance requirements. Watch this webinar to learn how CrowdStrike and AWS are helping to provide complete security for the cloud.
Posted: 14 Oct 2020 | Premiered: 14 Oct 2020

AWS & CrowdStrike
76 - 100 of 3692 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info