IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Multimedia (View All Report Types)
1 - 25 of 262 Matches Previous Page  |  Next Page
Shellshock In Action
sponsored by Trend Micro
VIDEO: In this demonstration video, see the shellshock bug in action and how easy it is for attackers to take advantage of it to gain access to your systems. Discover a technology that adds protection for shellshock bugs by adding an intrusion prevention system in order to protect your systems.
Posted: 01 Apr 2015 | Premiered: 01 Apr 2015

Trend Micro

Deep Security for AWS Workloads
sponsored by Trend Micro
VIDEO: Inside this brief video, discover a platform that provides security to workloads operating in cloud environments. Find out how it can easily integrate with cloud service providers and deliver automated, highly scalable security without compromising data center performance or limiting the clouds benefits.
Posted: 01 Apr 2015 | Premiered: 01 Apr 2015

Trend Micro

Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

Best Practices for Incident Detection and Response
sponsored by SurfWatch Labs
WEBCAST: This webcast teaches you how to get the most from your threat intelligence by presenting the best practices for incident detection and response.
Posted: 30 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Create a Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW: The white paper presents tips for creating a persuasive business case for better security investment.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014

FireEye

The Landscape of Threat Intelligence
sponsored by SurfWatch Labs
WEBCAST: The webcast will help you determine if threat intelligence is the best solution for you by giving you an in-depth look today's intelligence landscape.
Posted: 27 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Raise Cyber Risk Awareness and Management in the C-Suite
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses how you can bring security to the boardroom with effective and proactive security leadership.
Posted: 27 Mar 2015 | Premiered: Dec 2, 2014

SurfWatch Labs

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions

Anamoly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WEBCAST: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Premiered: Jan 24, 2015

Prelert

Choosing a Safe and Secure Service Delivery Platform
sponsored by Citrix
WEBCAST: Graham Melville, Senior Director, Product Marketing, NetScaler introduces the new capabilities of NetScaler MobileStream technologies.
Posted: 25 Mar 2015 | Premiered: May 6, 2014

Citrix

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Detecting Security Anomalies with Machine Learning Analytics
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Uncover the Abnormal with Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast shows you how to uncover abnormal network behavior with the help of security analytics and anomaly detection.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Unlocking the Potential of BYOD with a Mobile Device Management Service
sponsored by Maas360 by IBM
PRODUCT DEMO: This short video shows how one company can eliminate the headache of MDM and bring your company into the new age of mobility. View it now to see how your BYOD strategy can become simple, secure and cost effective.
Posted: 23 Mar 2015 | Premiered: 23 Mar 2015

Maas360 by IBM

How-To Video: Creating Web Security Manager for Azure
sponsored by Alert Logic
VIDEO: This brief video analyzes the problem and discusses how you can implements a better web application firewall that will catch even the most advanced threats.
Posted: 20 Mar 2015 | Premiered: 22 Jul 2014

Alert Logic

How to Effectively Replace BlackBerry Devices and Gain User Acceptance
sponsored by Citrix
WEBCAST: This on-demand webinar teaches you how to address mobile privacy concerns and security challenges with BlackBerry replacements. View the webinar now to learn how you can keep your enterprise safe and secure without sacrificing a great mobile user experience.
Posted: 20 Mar 2015 | Premiered: Mar 20, 2015

Citrix

Hospital La Fe Uses Vworkspace to Improve Security and It Maintenance
sponsored by Dell, Inc.
VIDEO: Access this brief video to see one healthcare organization's journey through administering their virtual desktops with a software solution that deploys and manages desktop virtualization and VDI technologies. Find out how they were able to simplify and automate the management of their VDI while increasing security and easing mobility.
Posted: 20 Mar 2015 | Premiered: 09 Feb 2015

Dell, Inc.

Leveraging AWS Data to Manage Spend and Allocate Costs
sponsored by Cloudcheckr
WEBCAST: This webcast details how to best harness AWS cost data and learn about more cost management strategies.
Posted: 16 Mar 2015 | Premiered: Jan 22, 2015

Cloudcheckr

Openness & Ecosystem Integration
sponsored by Cisco Systems, Inc.
VIDEO: This video highlights the openness of Cisco ACI, and reveals how customers across the board enjoy how it can integrate well with their current ecosystem.
Posted: 13 Mar 2015 | Premiered: 04 Feb 2015

Cisco Systems, Inc.

A10 Networks Joins the Cisco ACI Ecosystem
sponsored by Cisco Systems, Inc.
VIDEO: This video contains an interview between A10 Networks CTO, Raj Jalan, and Cisco Sr. Director, Shashi Kiran, in which they discuss a new application-centric infrastructure (ACI) solution.
Posted: 12 Mar 2015 | Premiered: 26 Jan 2015

Cisco Systems, Inc.

Security Lessons Learned from 2014
sponsored by ESET
WEBCAST: This webcast discusses some of the most prevalent threats of 2014 and the lessons learned from them.
Posted: 12 Mar 2015 | Premiered: Dec 31, 2014

ESET

MobileIron Platform Overview
sponsored by MobileIron
VIDEO: Access this one-of-a-kind video and find out how one company can successful protect your mobile devices and applications.
Posted: 11 Mar 2015 | Premiered: 16 Jun 2014

MobileIron

10 Ways to Tell its Time to Change Your Antivirus Software
sponsored by ESET
WEBCAST: This webcast addresses the question of whether you need to change your anti-virus software, and if so what to change it to.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET
1 - 25 of 262 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement