IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
76 - 100 of 3405 Matches Previous Page  |  Next Page
The Evolution of Security Operations and the Contemporary State of Play
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.
Posted: 17 Feb 2021 | Published: 31 Aug 2020

Kaspersky

Using Compliance Budgets to Build a Red Team Capability
sponsored by Randori
WHITE PAPER: In this white paper, learn how a red team solution can validate what’s working and what needs to be addressed at your organization.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

TOPICS:  Security
Randori

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 17 Feb 2021 | Published: 31 Jul 2020

Kaspersky

Security White Paper: Data Security is Serious Business.
sponsored by Alchemer
WHITE PAPER: The digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alchemer

Expand your Endpoint Security without Expending Resources
sponsored by Kaspersky
DATA SHEET: Now that the security perimeter is disappearing, integration can become a part of security stacks everywhere. Automation is already playing its part, and with the explosion of remote work at hand, a focus on endpoint detection and response (EDR) is necessary. View this data sheet to explore Kaspersky’s multi-layer security approach.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

The eSentire Difference
sponsored by eSentire
DATA SHEET: In this data sheet, learn how eSentire Atlas defends your digital business from evolving threats. Their cloud-native Managed Detection and Response (MDR) platform combines expert machine learning with expert analysts in their 24x7x365 Security Operations Centers (SOCs) to hunt and contain attacks.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

eSentire

Enhanced Security Solutions for Remote Teams
sponsored by Dropbox
RESOURCE: Today’s remote workforce relies on collaboration software more than ever before, so providing teams with secure, scalable and effective communication methods is a top priority for organizations. Read this resource to learn about Dropbox’s initiative to provide comprehensive collaboration capabilities to everyone, everywhere.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Dropbox

The Road to a Successful, Secure and Stable Cloud Transformation
sponsored by Alert Logic
EBOOK: The benefits of the cloud are no longer a secret, and neither are the risks. Companies can gain quite an advantage by migrating to the cloud, but they must go about it the right way in order to fully reap the benefits. Technically speaking, you must be mindful of security all the way. Access this guide to learn the 3 phases of cloud transformation.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alert Logic

6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments
sponsored by Alert Logic
EBOOK: In Verizon’s Payment Security Report, 63.3% of the organizations assessed did not maintain all PCI DSS controls. And this is not due to a lack of security tools – rather, organizations are missing PCI expertise, or the dedicated staff required to keep pace. Access this e-book to unlock 6 steps to overcoming PCI compliance challenges.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alert Logic

Incident Response: Prepare for the Unpredictable
sponsored by Fortinet, Inc.
WHITE PAPER: Nearly 80% of organizations are introducing innovations faster than they can secure them against cyberattacks. So you must understand the nature, scope and risks posed by incidents as well as the specialized tools, skills and repeatable processes for defending against them. Access this white paper by Fortinet to get schooled on incident response.
Posted: 17 Feb 2021 | Published: 21 Aug 2020

Fortinet, Inc.

Effective AI-Driven Security Operations
sponsored by Fortinet, Inc.
WHITE PAPER: For organizations to achieve their digital innovation outcomes while effectively managing complexity and defending against advanced threats, teams need a broad, integrated and automated cybersecurity platform. Download this white paper to discover Fortinet Security Fabric, an AI-driven platform with APIs to help manage security in unison.
Posted: 17 Feb 2021 | Published: 22 May 2020

Fortinet, Inc.

Cybersecurity is Improving, But is it Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

Integrated Cybersecurity Model for Your Work-From-Anywhere Environment
sponsored by NWN Corporation
WHITE PAPER: Cybercrime was lucrative across 2020 – the pandemic exposed several security gaps that hackers were eager to exploit. This white paper highlights how the Integrated Cybersecurity Model can help protect remote workforces from today’s evolving cyberthreats – read on to learn more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

NWN Corporation

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

5G & Wi-Fi 6: The Future of Wireless Communications
sponsored by TechTarget
RESOURCE: Cellular and Wi-Fi technologies have differed greatly in the past, but the future of wireless communication will likely see more cooperation than competition between 5G and Wi-Fi 6. To learn more about how these two technologies can work together, check out our all new expert guide. Access this guide after completing our brief survey.
Posted: 17 Feb 2021 | Published: 01 Mar 2021

TechTarget

Top 5 Considerations for Deciding Whether to Outsource or Create Incident Response
sponsored by Fortinet, Inc.
RESOURCE: Incident response (IR) is a strategic imperative, but some organizations may not have the resources to build an in-house IR team. This checklist provides 5 considerations to keep in mind when deciding between outsourcing and building an in-house IR program – read on to get started.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Fortinet, Inc.

2020 Enterprise Cloud Incident Response Survey
sponsored by Infoblox
RESEARCH CONTENT: In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.
Posted: 16 Feb 2021 | Published: 30 Sep 2020

Infoblox

Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT: Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

IDology

Randori Recon How To Prioritize Like An Attacker
sponsored by Randori
EBOOK: With the rise of cloud computing, containerization, and serverless computing, maintaining a perfect inventory of your external assets and ensuring they are patched has become an overwhelming challenge. Read this e-book to discover Randori’s best practices for analyzing your attack surface in the most effective way.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

Secrets to a Stronger Strategy for Container Security
sponsored by Alert Logic
WHITE PAPER: 58% of developers report that their companies use or plan to use containers in the next 12 months. Despite their smaller footprint and attack surface, containerized environments are still vulnerable. But setting up container security isn’t as mysterious as you may think. Leverage this AWS white paper to learn 8 secrets to securing containers.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Alert Logic

Your Best Defense Against Data Loss
sponsored by Webroot
WHITE PAPER: Cyber resilience means being able to stay up and running, even in the face of cyberattacks and data loss. Learn how you can get endpoint protection, network protection, security awareness training, and much more with Webroot and Carbonite.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Webroot

The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020
sponsored by Bitdefender
RESEARCH CONTENT: Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Posted: 16 Feb 2021 | Published: 30 Nov 2020

Bitdefender

Kaspersky for Security Operations Center
sponsored by Kaspersky
WHITE PAPER: Many organizations are establishing Security Operations Centers (SOCs) to combat security issues as they arise, providing a swift response and a decisive resolution.In this white paper, learn about Kaspersky’s Security Training Program as well as their other advanced offerings that can help make your SOCs and security teams the best they can be.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

TOPICS:  Security
Kaspersky

Data Sheet Trustwave Proactive Threat Hunting
sponsored by Trustwave
DATA SHEET: Blocking an attacker at the perimeter may not always work – today’s threats continue to bypass preventative security controls. This data sheet highlights how Trustwave Proactive Threat Hunting helps fortify defenses by identifying hidden attackers in your environment and open threat vectors that can lead to a breach – read on to learn more.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Trustwave
76 - 100 of 3405 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info