IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 3109 Matches Previous Page  |  Next Page
Experts Debate National Cybersecurity Policy Suggestions At RSAC 2017
sponsored by Absolute
EGUIDE: What exactly are President Trump's potential policies around encryption and international data flow and how might we all be affected? Download and find out the facts direct from the show floor.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Absolute

Why Secure Information Exchange is Critical for Digital Transformation
sponsored by OpenText
WEBCAST: Join Forrester Senior Analyst Heidi Shey as she breaks down the digital transformation and key requirements for success in regards to the information that fuels this digital future. Also delve into the importance and benefits of secure information exchange, as well as what to look for in secure information exchange solutions.
Posted: 20 Feb 2017 | Premiered: Feb 20, 2017

OpenText

Putting a Next-Generation Firewall Through Its Paces
sponsored by Forcepoint
WHITE PAPER: See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.
Posted: 20 Feb 2017 | Published: 31 Dec 2015

Forcepoint

Realize the Promise of VDI with Flash Storage
sponsored by Pure Storage
WHITE PAPER: If you're considering a virtual desktop infrastructure (VDI) implementation, or have one that isn't living up to expectations, read this white paper to learn about 4 common problems areas that cause VDI performance issues and how actual end-users were able to solve them with flash storage.
Posted: 20 Feb 2017 | Published: 30 Dec 2016

Pure Storage

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: Explore how many companies are unprepared for risks created by IoT apps. Uncover the report's key findings about how malware could pose a larger threat to mobile apps rather than IoT, organizations don't believe they know all the mobile and IoT apps running in the workplace, rush to release and ad hoc testing generates vulnerable code, and more.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Implementing App Security Efficacy and Centralized, Intelligent Threat Management
sponsored by Citrix
VIDEO: This brief video explores how to implement app security efficacy for centralized threat management both on-premise and in the cloud. Discover how to leverage a web app firewall, defend against threats on the app, infrastructure, and network levels, create stronger identity and access management, and enable real-time threat analytics.
Posted: 17 Feb 2017 | Premiered: 10 Feb 2017

Citrix

10 Reasons Why Your IT Incidents Aren't Resolved Faster
sponsored by EverBridge Inc.
WHITE PAPER: When disaster strikes, one of the most important aspects of your recovery strategy is communication. Access this white paper to learn the top 10 reasons why your IT incidents are taking time to resolve and how improving your communication strategy helps prepare you to handle the unexpected.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

EverBridge Inc.

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to ensure that your mobile devices, data, and user identities are secured. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately learn what benefits you can expect for your business.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
TRANSCRIPT: In this transcript join experts Brent Midwood and Kevin Beaver as they discuss best practices in approaching and addressing ransomware. Gain valuable insight into what drives ransomware developers (hint: the profits are enormous), the developing trends in ransomware deployment, and more.
Posted: 16 Feb 2017 | Published: 09 Feb 2017

AttackIQ

Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity
sponsored by IBM
CASE STUDY: The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

IBM

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

5 Key Questions About Hybrid Cloud
sponsored by Microsoft
EBOOK: In a world overrun by big data, there's only storage option to keep you head above water...way above it. Hybrid cloud: coming soon to an IT environment near you.
Posted: 15 Feb 2017 | Published: 30 Dec 2016

Microsoft

6 Discoveries IT Security Pros Need to Know about SSL Inspection
sponsored by A10 Networks
RESOURCE: Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Dissecting the Spora Ransomware: What Makes This Malware Tick?
sponsored by Booz Allen Hamilton
WHITE PAPER: Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

An In-depth look at "Satan": Ransomware-as-a-Service Malware on Deep Web
sponsored by Booz Allen Hamilton
WHITE PAPER: Get a first-hand, in-depth look at how the ransomware-as-a-service (RaaS) malware "Satan" is being promoted on the deep web.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

How to Uncover Threats in SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

A10 Networks

Security in a Mobile First World
sponsored by AVST
WEBCAST: Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

What's The Best Risk Analysis Method for Enterprises?
sponsored by Presidio Networked Solutions
EGUIDE: In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.
Posted: 20 Feb 2017 | Published: 16 Feb 2017

Presidio Networked Solutions

Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority

Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE: Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

BitSight
1 - 25 of 3109 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement