IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 4530 Matches Previous Page  |  Next Page
5 Things You Can Do by Adding a Layer of Cloud-Delivered Protection
sponsored by Cisco Meraki
RESOURCE: In this white paper, find out how you can deliver a 100% cloud-delivered secure internet gateway that provides a line of defense against threats on the Internet, and explore 5 things you can do by adding a layer of cloud-delivered protection.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

Cisco Meraki

Cisco Advanced Phishing Protection Privacy Data Sheet
sponsored by Cisco
DATA SHEET: Learn how Advanced Phishing Protection can help prevent identity deception-based attacks such as, social engineering and business email compromise from your organization.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

Cisco

IoT Security Compliance Framework
sponsored by Publitek
WHITE PAPER: In the IoT Security Compliance Framework, discover guidelines that can help your organization make high-quality, informed security choices with a comprehensive requirement checklist.
Posted: 22 Jan 2019 | Published: 31 Dec 2018

Publitek

8 Reasons Why SIEM Users Are Making the Switch to LogRhythm
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: In this resource, discover 8 reasons why SIEM users are making the switch to LogRythm, a security intelligence platform. Some of the reasons include stopping the bad guys, saving time and resources, the ease of use and more. Download the resource to find out all 8 reasons and read customer reviews.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

LogRhythm, Inc.

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

Fast-Growing AppsFlyer Automates Security Policy Validation with Axonius
sponsored by Axonius
CASE STUDY: In this case study, learn about how AppsFlyers used the Axonius platform to automate their security policy validation. With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

Axonius

Top Three Reasons Office 365 Customers Choose Cisco Email Security
sponsored by Cisco
RESOURCE: Learn the top 3 reasons why Office 365 customers choose Cisco Email Security.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

Cisco

Threat Intelligence Report
sponsored by DomainTools
RESEARCH CONTENT: Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs. Organizations are leveraging threat intelligence data for a number of use cases. In this white paper, learn more about benefits of threat intelligence platforms.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

DomainTools

Security Can Be Enhanced in the Cloud―But Only If You Make It a Priority
sponsored by CloudHealth Technologies
RESOURCE: Download this article for 4 reasons why your organization should make cloud security a priority and how to overcome potential cloud security challenges today.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

CloudHealth Technologies

Device Discovery for Vulnerability Assessment: Automating the Handoff
sponsored by Axonius
WHITE PAPER: While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are only able to scan and analyze those assets they know about. In this white paper, we'll highlight how automating both device discovery and making VA tools aware of new devices that should be scanned can help your security efforts.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

Axonius

The 1st Step to Zero Trust: Asset Management for Cybersecurity
sponsored by Axonius
WHITE PAPER: 8 years after the Zero Trust model was introduced, the concept has hit the mainstream. A Forrester analyst says 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement it. In this white paper, learn the first step to implementing zero trust: asset management.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

Axonius

IoT Security Architecture and Policy for the Enterprise a Hub Based Approach
sponsored by Publitek
WHITE PAPER: This document from the IoT Security Foundation is intended for businesses that are looking for operational and productivity benefits of using IoT. Read on to learn about a hub-based approach and see if this architecture is right for your enterprise.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

Publitek

Cisco Email Security Solution Overview
sponsored by Cisco
WHITE PAPER: Email is the most important business communication tool – and simultaneously, the most used for cyberattacks. According to Cisco's Annual Cybersecurity Report, attackers turn to email as the primary vector of spreading malware. In this white paper, learn about the benefits, protection and manageability Cisco's email security solution provides.
Posted: 21 Jan 2019 | Published: 30 Jun 2018

Cisco

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

ComputerWeekly.com

How Neustar SiteProtect NG Safeguards its Customers
sponsored by Neustar
VIDEO: In this video, hear from 6 Security and Network professionals on how their leading businesses were able to mitigate DDoS attacks using Neustar SiteProtect NG.
Posted: 18 Jan 2019 | Premiered: 16 Jan 2019

Neustar

How Permanent TSB Protects its Online Banking System from DDoS Attacks
sponsored by Neustar
VIDEO: Permanent TSB, the third largest Irish provider of personal retail banking services in Ireland, needed to protect their online banking services from harmful DDoS attacks. Read one to find out they accomplished DDoS security.
Posted: 18 Jan 2019 | Premiered: 18 Jan 2019

Neustar

The Unified Access Management Playing Field
sponsored by OneLogin
RESOURCE: Today, employees expect to work the way they live—not to step back in time when they work, whether they're in the office or remote. Read on to find out why IT leaders are rethinking their IAM strategy and moving towards a unified approach to access management.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

OneLogin

Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks
sponsored by Neustar
RESEARCH CONTENT: The ever-changing cyberthreat landscape requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

Neustar

Analyst Identity and Access Management Maturity Assessment
sponsored by OneLogin
ANALYST REPORT: To help security leaders, Forrester developed an IAM maturity assessment tool to help identify gaps in their current IAM strategy and practices and improve their overall security posture. Read on to see where your organization stacks up.
Posted: 17 Jan 2019 | Published: 23 Aug 2018

OneLogin

How Much Time Are You Spending on Compliance Discovery Searches?
sponsored by Hitachi Data Systems
RESOURCE: If you are spending any more than a couple hours per investigation on compliance discovery searches, you're losing more valuable time and resources than you need to. Download this infographic to assess if your compliance operations are optimized to maintain an efficient and productive workforce.
Posted: 17 Jan 2019 | Published: 31 Mar 2018

Hitachi Data Systems

Multi-Factor Authentication (MFA): Is this the Security Solution You Need?
sponsored by OneLogin
WHITE PAPER: Users want a simple user experience to complement the way they work. IT wants an adequate level of risk mitigation for the organization. Implementation of adaptive Multi-Factor Authentication (MFA) can balance these two factors. Read on to learn more.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Fortune 500 Financial Services Firm Closes its Mobile Security Gap with Lookout
sponsored by Lookout
CASE STUDY: Find out how this leading financial services firm closed a critical gap in their mobile data protection strategy using Lookout Mobile Endpoint Security.
Posted: 16 Jan 2019 | Published: 31 Dec 2016

Lookout

Post-Perimeter Security
sponsored by Lookout
VIDEO: In order to stay secure in the post perimeter world, enterprises must first test the health of devices and then trust the user. Download this video to learn how Lookout's zero-trust access model can help secure your organization with continuous monitoring and alerts today
Posted: 16 Jan 2019 | Premiered: 31 Oct 2018

Lookout

Putting the Trust in Zero Trust: Post-Perimeter Security for a New Age of Work
sponsored by Lookout
WHITE PAPER: As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Post-perimeter security. Read on to find out why perimeter security is no longer viable and how you can embrace this new architecture in your environment.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Lookout

Security at the Speed of Software Development
sponsored by WhiteSource
WEBCAST: DevSecOps is expected to grow for years to come and many companies have recognized the need to reposition to look more like DevSecOps. However, a lot of that repositioning is just marketing and there is no attempt to really make the transition. In this webcast, Larry Maccherone discusses a 3-part framework for adopting the DevSecOps culture.
Posted: 15 Jan 2019 | Premiered: May 9, 2018

WhiteSource
1 - 25 of 4530 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement