IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3369 Matches Previous Page  |  Next Page
A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: There are 6 scenarios where you and your customers are prone to fraud. In this white paper, discover these common scenarios and learn how a fraud detection platform can identify risks within your organization.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Splunk

Eight Components of a Successful BYOD Strategy
sponsored by MobileIron
WHITE PAPER: Download this resource to discover a UEM platform that enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

MobileIron

UEM Deployment Best Practices
sponsored by MobileIron
WHITE PAPER: Download this PDF now to find out the four steps to successfully deploying a UEM platform and learn how you can enable your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while maintaining security.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

MobileIron

SD-WAN Adoption is Accelerating to Reduce Security Risk
sponsored by Versa Networks
RESEARCH CONTENT: In this research report, gain valuable insights into how companies manage and secure their network across branch locations. Also, find out the expected benefits and challenges of SD-WAN.
Posted: 13 Apr 2018 | Published: 31 Dec 2017

Versa Networks

GDPR for HR
sponsored by Sage Software
RESOURCE: By their very nature, HR teams are key custodians of personal data that companies hold about their employees, starting with a person exploring job opportunities as a candidate. Tap into this 6-step guide for HR teams to prepare for GDPR.
Posted: 11 Apr 2018 | Published: 11 Apr 2018

Sage Software

The EU General Data Protection Regulation
sponsored by Oracle Cloud
WEBCAST: The General Data Protection Regulation (GDPR) gets a lot of buzz for what it will do for data privacy – but how much do you really know about what it means? Download this webcast to learn more about different aspects of GDPR, and discover how businesses can approach getting compliant.
Posted: 10 Apr 2018 | Premiered: Apr 6, 2018

Oracle Cloud

How to Create a Scalable & Sustainable Vendor Risk Management Program
sponsored by BitSight
WHITE PAPER: Massive cyberattacks are routinely attributed to vendors with substandard security practices. This resource offers a detailed 6-step guide for creating a sustainable and scalable vendor risk management program from the ground up.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

BitSight

Contractor Cyber Risk Continues to Grow
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Access this resource to learn 3 strategies to mitigate risk when hiring an outside contractor for your networking needs.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

The Insider's Guide to Cybersecurity For Government
sponsored by Microsoft
WHITE PAPER: The Insider's Guide to Cybersecurity for Government is your best practices path to confidence across the cloud and devices. Dive in to learn what your organization can expect from the latest cybersecurity technology and dedication of a leading cloud-based partner.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Microsoft

Empower Employees with the Digital Workspace
sponsored by Data#3
WEBCAST: Watch this brief video to learn about a digital workspace that allows IT to securely deliver any app from any cloud to any device.
Posted: 05 Apr 2018 | Premiered: Mar 21, 2018

Data#3

Securing MacOS in the Modern Work Era
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover a UEM platform for Mac devices that doesn't require integrations or additional training, and is seamless for end users, improves operational efficiency, and simplifies IT operations across the device lifecycle.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

MobileIron

Shoring Up the Weak Link in Phishing Defenses: Your People
sponsored by Veeam Software
WHITE PAPER: Because phishing is happening all of the time, to every organization, security pros need to understand where the next attack is going to come from in order to be better prepared. Explore this expert resource to learn how to secure the weakest link of your phishing defense: your people.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Veeam Software

Addressing User Data Risks in a Distributed Data World
sponsored by Druva Software
RESOURCE: With the EU's GDPR regulations ready to strike with stiff penalties for violators, businesses need a data governance policy that can keep them safe. Download this resource to discover a new approach to data governance.
Posted: 04 Apr 2018 | Published: 31 Dec 2016

Druva Software

A Guide to PCI Compliance in Containers
sponsored by Sysdig
WHITE PAPER: Containers have been adopted faster than any previous enterprise technology and with this quick rise in adoption, maintaining compliance can be difficult. This resource offers insight into PCI DSS compliance within containers.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Sysdig

Web Application Firewall (WAF) Security Value Map
sponsored by Citrix
WHITE PAPER: This resource shines light into an independent test and provides detailed information about Citrix's web application firewall product, including its security effectiveness, performance, and TCO.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Citrix

Technical Considerations for Mobility in the Enterprise
sponsored by Data#3
WHITE PAPER: Download this guide to help move your mobility discussion beyond just users and devices to take you through all the levels you need to consider for a more technical mobility strategy focused on workspace services and delivery.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Data#3

Ransomware: Everything you Need to Know
sponsored by Cisco & Dimension Data
WHITE PAPER: According to Cisco, a typical ransom can be anywhere from $200 to $10,000, but some institutions have paid a far higher price. Access this resource to uncover everything you need to know about ransomware and protecting your enterprise.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

IDC Infobrief: How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
sponsored by Citrix
RESOURCE: 79% of worldwide organizations plan to address application disruption via a unified application-delivery strategy. As multi-cloud environments become more common organizations struggle to secure and manage applications across multiple locations. Read on to see how a unified application delivery strategy can help solve these challenges.
Posted: 02 Apr 2018 | Published: 31 Oct 2017

Citrix

Seeing the Future is the Future of Cybersecurity
sponsored by Sophos
WEBCAST: In an effort to augment security, many vendors are looking toward transitioning from a reactive approach to a more predictive approach. Take a look at this webcast to gain insight into the future of cybersecurity and how your enterprise can better predict attacks to intercept them before they wreak havoc on your enterprise.
Posted: 02 Apr 2018 | Premiered: Apr 2, 2018

Sophos

Testing Endpoint Security: An Introductory Guide
sponsored by Sophos
WHITE PAPER: In this 25-page white paper, explore how to successfully test endpoint security software. Find out how testing a wide range of features in multiple scenarios is the best way to have clarity on how effective an endpoint security product can be against the advances that attackers have made in recent years.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Sophos

Webinar: How to Migrate Sensitive Records to AWS
sponsored by AWS - Logicworks
WEBCAST: Migrating sensitive data to the cloud is becoming unavoidable. You'll want to make sure it's done securely, especially with GDPR's stiff financial penalties looming. Register for this webinar taking place on May 1, 2018 to learn how to migrate sensitive data to Amazon Web Services (AWS).
Posted: 30 Mar 2018 | Premiered: Mar 30, 2018

AWS - Logicworks

Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)
sponsored by NSS Labs
WEBCAST: How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Considerations for Managing and Securing Box in the Enterprise
sponsored by VMware
WHITE PAPER: Download this white paper to learn how a unified digital workspace can provide users with access to file-sharing and collaboration apps they need, while delivering the security and management tools IT requires.
Posted: 30 Mar 2018 | Published: 30 Mar 2018

VMware

Eliminating Cybersecurity Obscurity Through Continuous Security Validation
sponsored by NSS Labs
PODCAST: How is your organization defending against security risks? Explore this podcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Demystifying the myths of public cloud computing
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
Posted: 27 Mar 2018 | Published: 27 Mar 2018

ComputerWeekly.com
1 - 25 of 3369 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement