IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Multimedia (View All Report Types)
1 - 25 of 266 Matches Previous Page  |  Next Page
Understand the Drivers Behind Hybrid Cloud Adoption
sponsored by Peer1
VIDEO: Tune into this video to discover the biggest drivers behind hybrid cloud adoption.
Posted: 22 May 2015 | Premiered: 22 May 2015

Peer1

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Overcome the Challenges Associated With New Technologies
sponsored by Peer1
VIDEO: This video highlights several challenges IT decision makers face when adopting new technologies.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

An Inside Look at Projected Hybrid Trends
sponsored by Peer1
VIDEO: Tune into this video to learn about several hybrid cloud trends projected for this year.
Posted: 19 May 2015 | Premiered: 19 May 2015

Peer1

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Simplify Saas and On-premises Integration
sponsored by Oracle Corporation
WEBCAST: Software as a Service (SaaS) is growing in popularity and is driving the need for new SaaS apps to be easily integrated with existing on-premises counterparts. This video introduces middleware that simplifies integration and enforces consistency through a common integration platform for SaaS and on-premise apps.
Posted: 13 May 2015 | Premiered: May 19, 2014, 01:17 EDT (05:17 GMT)

Oracle Corporation

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro

Distil Networks 2015 Bad Bot Report: 5 High-Risk Lessons
sponsored by Distil Networks
WEBCAST: Distil Networks has produced IT Security's most in-depth analysis on the sources, types and sophistication levels of last year's bot attacks. Listen to this exclusive webcast to keep your organization safe.
Posted: 11 May 2015 | Premiered: May 15, 2015

Distil Networks

Managing SSL/TLS Vulnerabilities and Virtual Patching Best Practices
sponsored by Trend Micro
WEBCAST: Access this webinar to learn the options you have to better manage vulnerabilities and discover new methods to adapt and mitigate known and unknown threats.
Posted: 08 May 2015 | Premiered: May 12, 2015

Trend Micro

Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST: This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015

Absolute Software

Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST: The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014

Absolute Software

What to Do When Your Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

Anatomy of Cyber Attack
sponsored by Hewlett-Packard Company
WEBCAST: Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Posted: 06 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

4 Anti-Malware Platforms Put Through an Anti-Exploit Test
sponsored by Malwarebytes Corporation
VIDEO: In this video, a series of anti-malware platforms are tested with an exploit simulator test to determine which product has the early detection capabilities required for effective security.
Posted: 06 May 2015 | Premiered: 14 Oct 2013


nti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

SearchSecurity.com

The Perfect Storm of Data, Cloud, and the Internet of Things
sponsored by IBM
VIDEO: View this video to learn how the cloud, despite all its well-publicized benefits and shortcomings, has found a new use-case: in helping support the "internet of things."
Posted: 05 May 2015 | Premiered: 05 May 2015

IBM

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

LifeCellar and Rackspace
sponsored by Rackspace
VIDEO: This video explains how Lifecellar was able to deploy a new hybrid cloud infrastructure that managed data efficiently while addressing security and privacy.
Posted: 30 Apr 2015 | Premiered: 30 Apr 2015

Rackspace

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusions
sponsored by Citrix Ready and SMS Passcode
WEBCAST: Join this live webcast on May 21, 2015 to learn the best practices for securing your remote access against sophisticated hackers.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Citrix Ready and SMS Passcode

Device and Data Protection - Part 3
sponsored by Dell, Inc. and Intel®
WEBCAST: This webcast outlines how to protect workspaces with three easy steps to malware prevention. Learn about security tools that are designed to keep unauthorized users out of your data and business by combining leading software and hardware protection.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Dell, Inc. and Intel®
1 - 25 of 266 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement