IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityMultimedia (View All Report Types)
1 - 25 of 307 Matches Previous Page  | Next Page
AVG Managed Workplace 9.0 - Exclusive 2 for 1 Offer: Buy One License, Get One License Free
sponsored by AVG Technologies
PRODUCT DEMO: Download this exclusive product demo to learn about a remote monitoring and management platform with an easy-to-use, web-based console and a pay-as-you-go model.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

AVG Technologies

AVG Content Filtering - Now Get 50% Off on Any 12- or 24-Month Subscription
sponsored by AVG Technologies
PRODUCT DEMO: This complimentary IT downloads lets you try a cloud content filtering solution for yourself.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

AVG Technologies

Exclusive offer for AVG CloudCare Partners – 50% off AVG Cloud Backup
sponsored by AVG Technologies
SOFTWARE DEMO: This complimentary IT download will allow you to experience a reliable, automated, company-wide backup solution that will protect your customer's data while driving greater productivity.
Posted: 18 Dec 2014 | Premiered: 18 Dec 2014

AVG Technologies

Diary of a Healthcare CISO
sponsored by Core Security Technologies
WEBCAST: This exclusive webcast explores the most pressing challenges and security risks in the healthcare information security landscape today.
Posted: 15 Dec 2014 | Premiered: Dec 15, 2014

Core Security Technologies

3 Ways That Retailers Can Address POS Security Challenges
sponsored by Bit9, Inc.
VIDEO: In this short video, learn how to address evolving malware threats and meet PCI DSS 3.0 compliance requirements with a proactive approach to security.
Posted: 15 Dec 2014 | Premiered: 07 Nov 2014

Bit9, Inc.

Modern Business Needs VDI to Soar
sponsored by VCE
VIDEO: Access this video to explore how VDI has changed over the years. Discover how a virtualization technology is partnering with a leading converged infrastructure solution to create a scalable, secure, high performing VDI solution and allowing for seamless transition into centrally managed, secure workspaces.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

VCE

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies

Exclusive Security Webcast: Targeted Attacks
sponsored by Vectra Networks
WEBCAST: This exclusive webcast takes an in-depth look at targeted attacks on the network and how to defend against them. View now to learn more.
Posted: 10 Dec 2014 | Premiered: Dec 10, 2014

Vectra Networks

Introduction to the Vectra X-series user interface
sponsored by Vectra Networks
WEBCAST: In this webcast from Enterprise Strategy Group, analysts study how the Vectra X-series platform - an inside-the-network cyber attack detection and reporting platform uses machine learning and data science to identify network behavior to identify each phase of the attack lifecycle.  Read on to learn more
Posted: 10 Dec 2014 | Premiered: Dec 10, 2014

Vectra Networks

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by CommVault
WEBCAST: In this exclusive webcast, Rachel Dines, Senior Analyst, Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive. View now to learn more.
Posted: 05 Dec 2014 | Premiered: Dec 5, 2014

CommVault

Defending Against DDoS Attacks: Magnification, Protection & Mitigation
sponsored by A10 Networks
WEBCAST: This webcast highlights the need for durable network security, especially in the age of conniving hackers.
Posted: 05 Dec 2014 | Premiered: Jul 25, 2014

A10 Networks

Brian Madden State of the Industry: Managing at the Windows Level
sponsored by AppSense
VIDEOCAST: In this video, expert Brian Madden discusses key desktop management trends, challenges and technologies, and reveals how to better manage your Windows users, accounts, and applications in virtual desktops. Find out how to securely and effectively deliver applications through virtual desktops to your predominantly mobile workforce.
Posted: 04 Dec 2014 | Premiered: Dec 4, 2014

AppSense

SIEM Missteps? Tips to Help You Move Forward
sponsored by LogRhythm, Inc.
PODCAST: Download this expert podcast now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 02 Dec 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

SIEM missteps? Tips to Help you move Forward
sponsored by LogRhythm, Inc.
WEBCAST: Download this expert webcast now to learn about implementing the necessary practices for effective security information and event management use.
Posted: 24 Nov 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

CSC MyWorkStyle: The Next Generation Workforce
sponsored by CSC
WEBCAST: This exclusive webcast details a suite of mobile solutions that can solve key problems for EMM. Read on to learn more.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

CSC

How to increase productivity and ensure the compliance & security of Citrix XenMobile and ShareFile
sponsored by Citrix Ready and eG Innovations
WEBCAST: In this webcast, take an in-depth look at enterprise mobility and security with IT professionals from Citrix Ready and eG Innovations.
Posted: 17 Nov 2014 | Premiered: Nov 17, 2014

Citrix Ready and eG Innovations

How To Achieve Security in a World Where Developers Rule
sponsored by Rackspace
VIDEO: This webcast features Rackspace Cloud Solutions Architect Jaret Chiles, and Senior Product Security Engineer Matt Tesauro, who explain how to secure your applications in the cloud.
Posted: 13 Nov 2014 | Premiered: 09 Jun 2014

Rackspace

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

SearchSecurity.com

Beth Israel & CommVault - Customer Testimonial
sponsored by CommVault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data and make it secure and accesible needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

CommVault

How important is it to have a secure and reliable web application infrastructure?
sponsored by Akamai Technologies
WEBCAST: This exclusive webcast takes an in-depth look at a web security solution that was able to deliver rock solid security without risking performance or cost. View now and take the first step towards a safer enterprise network.
Posted: 10 Nov 2014 | Premiered: Nov 10, 2014

Akamai Technologies

Protect Your Business from DDoS and Web Application Attacks
sponsored by Akamai Technologies
VIDEO: A solution more and more companies are turning to is cloud based service approach. You can scale the service to deal with ever increasing threats in a cost effective manner. Download and view this video to get an inside look at Forrester Research's findings regarding DDoS and application attacks.
Posted: 07 Nov 2014 | Premiered: 30 Oct 2014

Akamai Technologies

What is the impact to businesses when their web infrastructure is attacked?
sponsored by Akamai Technologies
VIDEO: Edward S Ferrara, Vice President & Principal Analyst at Forrester delves into the direct and indirect costs of attacks. To prepare yourself for attacks, download and view this video as a resource to refer to later when arming yourself against hackers.
Posted: 07 Nov 2014 | Premiered: 03 Nov 2014

Akamai Technologies

Denial of Service Use Case for Predicting Outages before they Occur
sponsored by IBM
VIDEO: This video demo provides an overview of how IBM SmartCloud Analytics Predictive Insights helps provide early warning in preventing a security attack.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

IBM
1 - 25 of 307 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement