IT Management  >   Systems Operations  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Multimedia (View All Report Types)
51 - 75 of 310 Matches Previous Page  |  Next Page
Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: This webcast discusses how you can build security architecture that safeguards your data at every stage of the data lifecycle.
Posted: 04 Sep 2015 | Premiered: Aug 27, 2015

Imation Corp.

How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: To learn what else Windows 10 can do for mobile app developers, access this webinar, which outlines the development capabilities built into the Windows 10 upgrade. View now to access guiding principles to help you get started developing Windows apps today.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015


Enhance your Enterprise's IAM
sponsored by
VIRTUAL ENVIRONMENT: This virtual environment explores how you can implement advanced IAM to prevent hacks from coming through third-party vendors and other vulnerable spots.
Posted: 02 Sep 2015 | Premiered: 24 Aug 2015

How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015


Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data security.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. View now to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

Monitoring Citrix Mobile Workspace with SCOM plug-in
sponsored by ComTrade
VIDEO: This webcast details a plug-in for Microsoft System Center Operations Manager (SCOM) monitoring platform that monitors the Citrix Workspace Suite. Watch now to see a demo of this solution and find out how its capabilities cover the entire Workspace Suite components.
Posted: 12 Aug 2015 | Premiered: 22 May 2015


"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015


Selecting a SIEM: Experiences from the Trenches
sponsored by LogRhythm, Inc.
WEBCAST: This webcast features a panel discussion that will give you practical insights from SIEM veterans to help you refine your security strategy.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger, CEO of Starmobile, joins Brian Madden to hash out app refactoring. They discuss how to extend application virtualization, and capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015


Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015


Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015


Using Open Source Intelligence to Enhance Physical Security
sponsored by Cyveillance, Inc.
WEBCAST: This webinar discusses various types of open source threat data available, and how security professionals can use it to more effectively protect organizations and executives.
Posted: 16 Jul 2015 | Premiered: Jun 18, 2015

Cyveillance, Inc.

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can ensure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015


Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Enterprise

Edge for the Operations Support User
sponsored by Unisys
VIDEO: This video reveals a service management operations console that provides access to all the tools and information organizations need to quickly (and securely) address service requests and IT issues.
Posted: 11 Jun 2015 | Premiered: 11 Jun 2015


Edge for the Mobile End User
sponsored by Unisys
VIDEO: This video features a service management solution that allows your mobile users to quickly and easily manage their service needs on the go—from any location and on any device.
Posted: 10 Jun 2015 | Premiered: 10 Jun 2015


Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

Redefining Enterprise Storage Management with the Cloud
sponsored by Nimble Storage
WEBCAST: In this webcast, Founder and Chief Scientist of DeepStorage Howard Marks analyzes current storage management capabilities in light of the emergence of flash storage, and leads a discussion with two customers about their experiences utilizing one storage management platform for automated support and predictive analytics.
Posted: 06 May 2015 | Premiered: Apr 17, 2015

Nimble Storage

Security on the Edge Classroom
sponsored by
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

51 - 75 of 310 Matches Previous Page    1 2 3 4 5 6    Next Page
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement