IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 2871 Matches Previous Page  |  Next Page
Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Internet of Things Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.
Posted: 26 Apr 2016 | Premieres: 01 May 2016

SearchSecurity.com

Building the Next-Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: Discover how you can construct an IP layer in order to facilitate a wide variety of new communications services, devices and applications. It also discusses managing this proliferation of new features utilizing the IP layer, despite ever-growing complexity.
Posted: 26 Apr 2016 | Published: 06 Apr 2016

Oracle Corporation

Communications Security: A Blueprint for Enterprise Session Border Controller Deployments
sponsored by Oracle Corporation
WHITE PAPER: Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.
Posted: 26 Apr 2016 | Published: 31 Aug 2015

Oracle Corporation

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

The Search for Answers to 'Advanced Threat' Defense
sponsored by Dimension Data
EGUIDE: This e-guide introduces a report that looks at mobile data protection. It also identifies strategies which companies are using to improve monitoring of corporate data, and prevent its loss through mobile applications and devices.
Posted: 22 Apr 2016 | Published: 21 Apr 2016

Dimension Data

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

AirWatch EMM Gets Windows 10 Support, Security
sponsored by VMware
EGUIDE: This e-guide teaches you the benefits of integrating AirWatch into your business operations as well as the Privacy First polity that AirWatch abides by. Access now to learn how AirWatch can add great convenience to your organization, while not encroaching into users' personal information.
Posted: 21 Apr 2016 | Published: 20 Apr 2016

VMware

10 Questions to Ask Your Vendor about File Gateway Consolidation
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

IBM

Governing in the Cloud
sponsored by EMC
RESOURCE: The cloud is transforming IT and data storage, but government and large public organizations have obvious restrictions on how they can use the public cloud to store data. Access this microsite to how the government is benefiting from on-premise object storage.
Posted: 21 Apr 2016 | Published: 06 Apr 2016

EMC

Is It Time to 'Software-Define' Your Network Security?
sponsored by SearchSecurity.com
EBOOK: Finding security in SDN means and methods
Posted: 20 Apr 2016 | Published: 20 Apr 2016

SearchSecurity.com

The Biggest Security Challenges for Embedded and Mobile Development amid the Rise of IoT
sponsored by Programming Research
EGUIDE: Internet-enabled devices are wreaking havoc on application development and security professionals. Explore the major challenges that complicate embedded and mobile security and 7 questions to keep in mind when developing secure applications.
Posted: 20 Apr 2016 | Published: 19 Apr 2016

Programming Research

Why Application Delivery Matters in the Digital Economy
sponsored by Citrix
WHITE PAPER: Users are demanding instant access to apps and data from any device and any location. As a result, application delivery defines your organization's ability to generate growth, revenue and profit. This white paper highlights the four factors determining your success and the challenges surrounding them.
Posted: 20 Apr 2016 | Published: 30 Sep 2015

Citrix

Expert Advice for Software Security Testing (Including Embedded Systems)
sponsored by Programming Research
EGUIDE: What's the difference between security for embedded software and regular software testing? This two-part e-guide reveals best practices for security testing embedded software. Inside, discover how threat modeling can ensure a secure embedded system.
Posted: 20 Apr 2016 | Published: 18 Apr 2016

Programming Research

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

VMware identity management adds SSO to AirWatch
sponsored by VMware
EGUIDE: This e-guide shows you how to better manage network access from mobile devices with a single sign-on (SSO) application. Access now to gain better security across all your remote locations while also adding ease of access for authorized users.
Posted: 20 Apr 2016 | Published: 19 Apr 2016

VMware

Accelerate Your Digital Business Through Cybersecurity
sponsored by Dimension Data
VIDEO: Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.
Posted: 19 Apr 2016 | Premiered: 01 Feb 2016

Dimension Data

3 Areas Where Healthcare Providers Need Your MSP Expertise
sponsored by Solarwinds N-able
EBOOK: The healthcare market represents a huge opportunity for managed services providers (MSPs), and analysts predict this trend will continue to expand for years to come. Access this eBook to learn about healthcare information technology needs and how to meet them.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Solarwinds N-able

Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
RESOURCE: From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 19 Apr 2016 | Published: 27 Feb 2016

Dimension Data

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Visual Analytics: Easily Explore Data to Make Decisions You Can Trust
sponsored by TIBCO Software Inc.
WHITE PAPER: Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

TIBCO Software Inc.

Server Hosted Virtual Desktops: How the Top Seven Providers Stack Up
sponsored by Citrix
RESEARCH CONTENT: With the many options for VDI, it can be hard to choose which one is suited for your business. So before you jump into a VDI deployment, access this report to assess the state of the VDI vendor market and gain insight into the strengths and weaknesses of the top seven vendors as well as how these vendors stack up against each other.
Posted: 18 Apr 2016 | Published: 18 Sep 2015

Citrix
1 - 25 of 2871 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement