IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 3323 Matches Previous Page  |  Next Page
How to Track Privileged Users' Activities in the Active Directory
sponsored by Lepide Software
EBOOK: Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

How LepideAuditor Helps You Detect and Prevent Insider Threats
sponsored by Lepide Software
EBOOK: Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

The Smart, Secure Cloud for the UK
sponsored by Google Cloud
WHITE PAPER: This document gives an overview of how security is designed into Google's technical infrastructure. Read on to learn about the lengths to which Google has gone to provide a level of security that you need in order to have confidence in your cloud deployments.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Google Cloud

A Look at the Shared Responsibility Model for Cloud Providers
sponsored by SolarWinds, Inc.
EGUIDE: Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

What's New in the World of Managed Security Providers?
sponsored by SolarWinds, Inc.
EGUIDE: Go inside this expert guide to explore the 2 major ways managed security service providers have changed in recent years.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

AI, Risk-Based and Context: Trading in Your Password for the Intelligent Future
sponsored by Crossmatch
TRANSCRIPT: Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Crossmatch

Yelp Improves Their Security Posture: Umbrella Customer Experience
sponsored by Cisco Umbrella
VIDEO: Hear from Yelp's Head of Security Vivek Raman about how his team used Cisco Umbrella to automate and improve their incident response. Find out how they enhanced their ability to protect sensitive employee data, respond to incidents faster, defend against advanced malware, and more.
Posted: 26 Jul 2017 | Premiered: 01 Jun 2017

Cisco Umbrella

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Composite Authentication: The Evolution Beyond 2FA/MFA
sponsored by Crossmatch
PODCAST: In this podcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 26 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Tool Overview: HyTrust Multi-Cloud Security and Automated Compliance
sponsored by HyTrust
PRODUCT OVERVIEW: In this technology brief, learn about HyTrust Multi-Cloud Security and Automated Compliance, security software for a multi-cloud infrastructure. Discover key features and benefits, and how you can implement this tool for your own enterprise security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Worldwide IT Service and Incident Management Software 2017 Vendor Assessment
sponsored by Cherwell
WHITE PAPER: The IT service and incident management software market is increasingly growing more crowded and competitive than ever. Read this report to review the factors driving market growth, what to look for in a potential investment, and gain an overview of the top 12 vendors in the market.
Posted: 26 Jul 2017 | Published: 30 Jun 2017

Cherwell

Product Overview: 30 Minutes to a More Secure Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Cisco Umbrella

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

The Cloud Evolution: Top Security Challenges & How to Overcome Them
sponsored by AWS-Trend Micro
WHITE PAPER: Cloud used to be notorious for falling short when it came to security. This hasn't exactly changed, but we now have security tools that help take care of that. Access this white paper to learn about a technology that tackles three of the top cloud security challenges.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

AWS-Trend Micro

Passwords are Out: But What's Replacing Them?
sponsored by Crossmatch
WHITE PAPER: Join experts Keven Beaver and Jeff Carpenter in this interview as they discuss why passwords are obsolete and what the "human-proofed" future of authentication will look like.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Crossmatch

2017 Application Security Report
sponsored by WhiteHat Security
WHITE PAPER: With so many cyberattacks targeting the app layer, securing it is vital to your organization's digital transformation. In this insightful report discover 60 pages of detailed app security data.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

WhiteHat Security

Overcoming Overwhelmed IT Security Teams with Amazon Web Services
sponsored by AWS-Trend Micro
EBOOK: Access this e-book to dive into the three main problem areas of cloud security: server management, the human element, and having the wrong tools for the job. You will also learn how to provide security for your AWs environment.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

AWS-Trend Micro

Why Firewalls And Antivirus Alone Are Not Enough
sponsored by Cisco Umbrella
WHITE PAPER: Firewalls and antivirus defenses react to malicious code after attacks have launched – but it's becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition. Learn more about each step of an attack by exploring 4 examples so that you can better prepare your defenses.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Continuous Application Security Testing Benefits
sponsored by WhiteHat Security
WHITE PAPER: Security scrutiny is heavier than ever for financial services. Learn 4 benefits of properly deployed continuous application security testing can give your organization to help shine under the current environment of scrutiny.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

WhiteHat Security

Turn the Web from a Security Risk into an Asset
sponsored by Authentic8, Inc.
WHITE PAPER: Just being on a web browser can put your organization at risk. But forgoing web access is out of the question. Discover how browser isolation could improve your organization's security posture.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Authentic8, Inc.

Excessive Permissions: Mitigate Risk on Shared Folders
sponsored by Lepide Software
WHITE PAPER: Insider threats have a hard time harming your organization if they do not have access to sensitive data. Learn how to detect if a user has excessive permissions on shared folders and mitigate the risk of insider threats.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Lepide Software

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future? Learn more inside this white paper.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

Passwords Are Out: But What's Replacing Them?
sponsored by Crossmatch
PODCAST: Join experts Keven Beaver and Jeff Carpenter in this podcast as they discuss why passwords are obsolete and what the "human-proofed" future of IAM and authentication will look like.
Posted: 25 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch
1 - 25 of 3323 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement