IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityMultimedia (View All Report Types)
51 - 75 of 302 Matches Previous Page  | Next Page
Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

One Campus Card Solution That Solves Identity Issues
sponsored by HID
WEBCAST: This webinar takes a peek into the European education market, and presents a new kind of security identity solution that is paving the way of the future.
Posted: 07 Aug 2014 | Premiered: Aug 7, 2014

HID

Mobile Authentication Receives a Modern Twist
sponsored by HID
WEBCAST: This webcast introduces a complete access control solution designed for mobile devices, banishing the need for multiple passwords or security tokens.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
WEBCAST: In this helpful webcast, learn how your organization can leverage new integrated IT solutions like managed security and cloud services and to improve your business's efficiency and security, and create value for your customers.
Posted: 06 Aug 2014 | Premiered: Aug 1, 2014

NEC Corporation of America

The Convergence of Physical and Logical Access
sponsored by HID
WEBCAST: This webcast explores the convergence of physical and logical access with a single access card, as well as managing and reporting through a single portal.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Using the Latest Technology Trends to Stay Secure and Risk Free
sponsored by DLT Solutions
WEBCAST: Access this webcast to get an insider perspective for maintaining security when operating in the public sector.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

DLT Solutions

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this white paper, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Real-World Security Testing: Why Industry Experts Say it's Essential
sponsored by Fortinet, Inc.
WEBCAST: Tune in to this webinar to separate the facts from hype as industry experts examine how organizations can best bolster their IT defense, and why real-world testing is a critical part of any security solution. W
Posted: 31 Jul 2014 | Premiered: May 7, 2014

Fortinet, Inc.

How to Launch a Virtual Infrastructure in Less Than an Hour with Guardia Fabric
sponsored by Zentera Systems Inc.
VIDEO: Download this exclusive video now for information on a self-service fabric tool that will allow you to build your own virtual infrastructure in less than an hour.
Posted: 31 Jul 2014 | Premiered: 31 Jul 2014

Zentera Systems Inc.

Top 5 Requirements for Today’s NGFW
sponsored by Fortinet, Inc.
VIDEO: Popular data breaches like those at eBay and Monsanto have led to an increasing desire among organizations to leverage next generation firewalls. This webinar explains the top drivers, features, and decision criteria for these firewalls.
Posted: 30 Jul 2014 | Premiered: 06 Jun 2014

Fortinet, Inc.

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
VIDEO: This webinar gives a description of distributed denial-of-services attacks and explains the benefits of a DDoS mitigation solution.
Posted: 30 Jul 2014 | Premiered: 17 Apr 2014

Fortinet, Inc.

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Is Your Organization Safe from Advanced Persistent Threats?
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Secure, sync and share content on your mobile device - BYOD
sponsored by Acronis
VIDEO: This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Acronis

How Conventional Security Tools Expose Modern Data Centers to Cyber Threats
sponsored by CDW Corporation
WEBCAST: This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.
Posted: 21 Jul 2014 | Premiered: Jun 17, 2014

CDW Corporation

New Strategies for Protecting Enterprise Networks and Endpoints
sponsored by CDW Corporation
WEBCAST: This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Posted: 21 Jul 2014 | Premiered: May 31, 2014

CDW Corporation

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

How to Quickly and Easily Configure Patch Management Policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: Learn how simple it is to configure patch management policies.
Posted: 09 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Hexis Webinar: Cyber Attack Strategies with Research Analyst Rick Holland
sponsored by Hexis Cyber Solutions Inc
WEBCAST: In this helpful webinar, Forrester research analyst Rick Holland helps you to reformulate a security strategy for your company that stands up against adversaries.
Posted: 07 Jul 2014 | Premiered: Jun 10, 2014

Hexis Cyber Solutions Inc

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
51 - 75 of 302 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement