IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Multimedia (View All Report Types)
1 - 25 of 264 Matches Previous Page  |  Next Page
Chrome OS: Secure from Bootup to Shutdown
sponsored by Google Cloud
VIDEO: As businesses create more data, it's becoming more important than ever to protect it. Watch this on-demand Google webinar to understand how Chrome OS is uniquely designed with best-in-class security at both the hardware and software levels.
Posted: 30 Nov 2017 | Premiered: 21 Nov 2017

Google Cloud

Introducing Smart Check and Citrix Smart Tools
sponsored by Citrix
VIDEO: If you run XenApp and XenDesktop sites, you understand the importance of keeping them both secure and up-to-date. This five minute video demonstrates how to proactively diagnose and repair issues as they arise rather than waiting for them to cause significant issues.
Posted: 21 Nov 2017 | Premiered: 25 Jan 2017

Citrix

3-Fold Approach and Best Practices to Cyber Security
sponsored by Citrix
WEBCAST: 71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.
Posted: 15 Nov 2017 | Premiered: Nov 15, 2017

Citrix

Payer's Place in the Healthcare Ecosystem Keys to Success
sponsored by HealthEdge
VIDEO: Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.
Posted: 10 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Cloud Security in 2 Minutes
sponsored by AWS-Cisco
VIDEO: Instead of adding hardware to their network, many organizations are moving to the public cloud. The problem is that this can increase your attack surface and vulnerability. Take 2 minutes to learn how entity modeling helps monitor threats, data exfiltration, and more in public clouds, private networks, and hybrid environments.
Posted: 08 Nov 2017 | Premiered: 10 Oct 2017

AWS-Cisco

Cisco Stealthwatch Cloud Free Trial
sponsored by AWS-Cisco
SOFTWARE DEMO: If you want to compete in modern business, you need to adopt the cloud. You also need a way to secure your public cloud, private network, and/or hybrid environment. Access this free trial of Cisco's Stealthwatch Cloud, a software-as-a-service cloud security tool for visibility and threat detection.
Posted: 07 Nov 2017 | Premiered: 07 Nov 2017

AWS-Cisco

15 Essential DNS and DNSSEC Monitoring Tests
sponsored by Men and Mice
WEBCAST: Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.
Posted: 03 Nov 2017 | Premiered: Nov 10, 2016

Men and Mice

IoT Botnets: The Stakes Have Changed. Have you?
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 25 Oct 2017 | Premiered: Nov 21, 2016

Arbor Networks

IoT Botnets and DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT botnets quickly spread. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Premiered: Apr 6, 2017

Arbor Networks

Möbius Partners Helps Rent-A-Center Transform IT by Deploying a Software Defined Data Center
sponsored by Mobius Partners
VIDEO: Rent-A-Center was struggling to deploy thousands of virtual machines at a time for stores across the United States. Take 3 minutes to learn about a platform that enabled Rent-A-Center to accomplish all of this, gaining the ability to manage the virtual infrastructure, as well as automate, manage and control provisioning.
Posted: 20 Oct 2017 | Premiered: 29 Feb 2016

Mobius Partners

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

A Day in the Life of a GDPR Breach
sponsored by Splunk
WEBCAST: This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.
Posted: 12 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
WEBCAST: ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.
Posted: 09 Oct 2017 | Premiered: 09 Oct 2017

SearchSecurity.com

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
PODCAST: 50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

The Human Factor 2017
sponsored by Proofpoint, Inc.
VIDEO: 90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.
Posted: 06 Oct 2017 | Premiered: 06 Oct 2017

Proofpoint, Inc.

Turning the Tide Against Ransomware
sponsored by Proofpoint, Inc.
WEBCAST: WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.
Posted: 05 Oct 2017 | Premiered: Oct 5, 2017

Proofpoint, Inc.

Your Security Sandbox Won't Catch it all: The Phishing Problem
sponsored by Proofpoint, Inc.
WEBCAST: Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Cloud Data Management: Enabling Hybrid IT Infrastructure
sponsored by Commvault
VIDEO: Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.
Posted: 02 Oct 2017 | Premiered: 26 May 2017

Commvault
1 - 25 of 264 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement