IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityMultimedia (View All Report Types)
76 - 100 of 240 Matches Previous Page  | Next Page
Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

The power of the Citrix mobility solution, XenMobile
sponsored by Citrix
WEBCAST: This informative webcast examines a mobile device management (MDM) solution from industry giant Citrix that can secure and manage the devices within your enterprise environment easily and effectively. Tune in now to see a demo of this tool and see first-hand how simple and helpful it really is.
Posted: 29 Oct 2013 | Premiered: Oct 29, 2013

Citrix

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AlienVault

IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace
sponsored by VMware, Inc.
WEBCAST: This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

VMware, Inc.

Enterprise Mobility University: Mobile Device Management and BYOD Classroom
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom will provide a mobile landscape overview, along with strategies for staying afloat in this BYOD era.
Posted: 06 Sep 2013 | Premiered: 16 Aug 2013

SearchCIO.com

Key Considerations for Big Data Security Analytics SIEM 2.0
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

Big Data Intersection with Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explores the impact the looming intersection of big data and security analytics will have on your organization and explores why you should be looking forward to it.
Posted: 03 Sep 2013 | Premiered: Feb 28, 2013

LogRhythm, Inc.

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Understanding Secure Work Space for iOS and Android Devices
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can establish and maintain a secure workspace for mobile platforms such as Android and iOS.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute Software
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute Software

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Exposing the Beast - Custom API Mgt for the Enterprise
sponsored by Intel Corporation
WEBCAST: In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
Posted: 01 Nov 2013 | Premiered: Nov 4, 2013

Intel Corporation

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Limited
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Limited

Podcast: Security across your enterprise mobile devices: What you need to know
sponsored by BlackBerry
PODCAST: This exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

Security University: GRC Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans
Posted: 27 Sep 2013 | Premiered: 05 Jul 2013

SearchCompliance.com

Reducing Your Patch Cycle to Less Than 5 Days
sponsored by Tenable Network Security
WEBCAST: This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
Posted: 27 Sep 2013 | Premiered: Sep 3, 2013

Tenable Network Security

Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

McAfee, Inc.
76 - 100 of 240 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement