IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
1 - 25 of 2545 Matches Previous Page  | Next Page
ROI and Benefits of a Cloud-Based Application Security Service
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester Research, Inc., discover the potential ROI you could achieve by deploying a cloud-based application security service. Explore the costs and risk of this technology, and weigh them with the benefits you could experience.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Veracode, Inc.

Free Trial: Real-Time Threat Detection and Security Visibility from Day 1
sponsored by AlienVault
SOFTWARE DOWNLOAD: This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Posted: 24 Jul 2014 | Premiered: 24 Jul 2014

AlienVault

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, explore several best practises that should be implemented to support workforce mobility.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

VMware SDDC: IT Architecture for the Cloud Era
sponsored by Symantec
VIDEO: This white paper explores the benefits of building a software-defined data center to handle the challenges and demands of the modern data center.
Posted: 24 Jul 2014 | Premiered: 17 Dec 2013

Symantec

A Security Operations Center for Small and Mid-Sized Enterprises
sponsored by AlienVault
WHITE PAPER: This white paper reviews one company's security operations center, which is renowned for being tailored to small and medium-sized businesses (SMBs), with a host of additional features.
Posted: 24 Jul 2014 | Published: 26 Mar 2014

AlienVault

Unleashing Fast IT: Business and IT Working Together
sponsored by Cisco Systems, Inc.
DATA SHEET: Learn how software-defined networking (SDN), cloud computing and management applications can help you achieve less complexity, more agility and assured security within the IT environment.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Cisco Systems, Inc.

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

An EMM Checklist for CIOs: Factors to Consider When Choosing an EMM Solution
sponsored by BlackBerry
WHITE PAPER: For help deciding on an Enterprise Mobility Management (EMM) solution consider the issues in the following white paper. It's derived from third-party research and best practices. It covers the critical areas you'll need to think through as you arrive at a decision. It also provides a CIO's Guide to EMM.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Secure by Design: How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control and Other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This whitepaper examines how Citrix XenApp and Citrix XenDesktop solutions can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

Citrix

Application data security risks on Android devices
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

ComputerWeekly.com

Survey: Can Security in Higher Education Be Both Open and Secure?
sponsored by AlienVault
WHITE PAPER: This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Posted: 23 Jul 2014 | Published: 30 Jun 2014

AlienVault

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Webcast: Practical Threat Management and Incident Response for Small and Medium-Sized Enterprises
sponsored by AlienVault
WEBCAST: This helpful webcast discusses a multitude of critical issues related to threat management in small and medium-sized enterprises.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

A Secure Transition to iOS
sponsored by IBM
WHITE PAPER: Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

IBM

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Secure, sync and share content on your mobile device - BYOD
sponsored by Acronis
VIDEO: This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Acronis

5 Things Your Organization Can Do Today to Improve Security
sponsored by CDW Corporation
WHITE PAPER: This informative resource contains insights from a security assessment professional on the problematic patterns that he has observed within a wide variety of organizations, as well as their simple but critical solutions.
Posted: 22 Jul 2014 | Published: 04 Apr 2014

CDW Corporation

Keeping IT Security Decision-Making on Track
sponsored by CDW Corporation
WHITE PAPER: This resource defines multiple approaches to IT security organization and decision-making that can help companies to determine the most effective ways of functioning in these areas.
Posted: 22 Jul 2014 | Published: 21 Feb 2013

CDW Corporation
1 - 25 of 2545 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement