IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Multimedia (View All Report Types)
26 - 50 of 270 Matches Previous Page  |  Next Page
Total Enterprise Mobility
sponsored by IBM MaaS360
WEBCAST: A strong enterprise mobility management (EMM) strategy is the key to success. Learn about the approaches necessary to planning the best EMM strategy for your organization and a solution that implements your plans to meet your needs.
Posted: 31 May 2016 | Premiered: Mar 23, 2016

IBM MaaS360

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

How Equinix Uses Splunk as a Cloud-based SIEM
sponsored by Splunk
WEBCAST: Join this webinar to hear from George Do, CISO at Equinix, about how cloud-based SIEM can deliver you instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016

Splunk

Evolving Endpoint Security Controls for Effective Threat Protection
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about enterprise endpoint security controls to ensure your organization has successful threat protection.
Posted: 16 May 2016 | Premiered: 02 May 2016

SearchSecurity.com

Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Internet of Things Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.
Posted: 26 Apr 2016 | Premiered: 01 May 2016

SearchSecurity.com

Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST: This webinar contains the results of a study aimed at revealing which endpoint security strategies are most effective at dealing with today's dangerous array of cyber threats.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015

Palo Alto Networks

Closing the Cybersecurity Gap
sponsored by Palo Alto Networks
WEBCAST: This webcast assesses the growing risk that hackers pose to your enterprise. Watch now to learn about improving your overall security response, from advanced detection tools to creating safer networks that are more immune to attack.
Posted: 12 Apr 2016 | Premiered: Apr 12, 2016

Palo Alto Networks

Automation in Network Security Management: Friend or Foe?
sponsored by Palo Alto Networks
WEBCAST: This webcast discusses the risks and benefits of automation as it pertains to security the psychological aspects of being against automation, and how you can automate your network processes for threat analysis and also from a management perspective.
Posted: 11 Apr 2016 | Premiered: Apr 11, 2016

Palo Alto Networks

Managing AWS: Gain Transparency into Cloud Computing
sponsored by Splunk
WEBCAST: Explore how FINRA, the Financial Industry Regulatory Authority, adopted a cloud services platform with both an identity access management feature along and a data management platform to improve the security of their data.
Posted: 07 Apr 2016 | Premiered: Apr 7, 2016

Splunk

Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) system can allow you to discover all IP-enables assets on your network, identify vulnerabilities quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Deliver Secure Access to Cloud, Mobile, Windows Apps from Any Device
sponsored by VMware, Inc.
VIDEO: This brief video shows a single platform that integrates identity, application, and enterprise mobility management to securely deliver data and apps to any mobile device.
Posted: 26 Feb 2016 | Premiered: 09 Feb 2016

VMware, Inc.

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: In this webcast, data protection analyst Jason Buffington from ESG provides guidance on how virtualization protection and recovery are evolving to provide the high availability today's business units demand.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

The Insiders' View: Spear Phishing and the Enterprise
sponsored by Cloudmark
VIDEO: This panel discussion dives into the topic of spear phishing, the most effective hacking technique facing organizations today.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

Threat intelligence
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school looks at what a threat intel service can and cannot provide and discusses the status of the new(ish) standards for intelligence exchange.
Posted: 20 Jan 2016 | Premiered: 15 Jan 2016

SearchSecurity.com

Podcast: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
PODCAST: Using these tools and tactics, you can identify advanced attacks and protect the crown jewels on your network.
Posted: 18 Feb 2016 | Premiered: Feb 16, 2016

Lancope

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST: This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016

Prelert
26 - 50 of 270 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement