IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
1 - 25 of 2856 Matches Previous Page  | Next Page
The Enemy Within: The Changing Face of Threats to Information Security
sponsored by Clearswift
WHITE PAPER: This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.
Posted: 21 Oct 2014 | Published: 17 Oct 2014

Clearswift

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014


SharePlan Works for the Workforce, Works for the Man
sponsored by Code42
WHITE PAPER: Read on to learn more about how enterprise file sync/share responds to the merging priorities of the mobile workforce and how it solves data security problems.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Code42

How to Woo Employees to Enterprise File Sync & Share: The Dropbox Breakup
sponsored by Code42
WHITE PAPER: Read this whitepaper to find out more about the dangers of personal cloud sharing and the benefits of enterprise-ready file sync and share.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Code42

Secure Access to Sensitive Data on the Move
sponsored by Bull
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

Bull

Enterprise-Ready Sync From Day 1
sponsored by Code42
WHITE PAPER: Access this white paper to learn about an enterprise-grade sync and share solution.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Code42

Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks

Comparing 6 Web Application Firewall Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: This helpful resource from NSS Labs provides detailed comparisons and analyses of web application firewalls from Barracuda, Citrix, F5, Fortinet, Imperva, and Sangfor.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Fortinet, Inc.

Journey to the Hybrid Cloud
sponsored by VMware
WHITE PAPER: Access this whitepaper for insight into the hybrid cloud service provider landscape and key considerations for choosing a provider. Additionally, find out more about how hybrid cloud implementations enable many capabilities and business benefits.
Posted: 20 Oct 2014 | Published: 30 Sep 2014

VMware

SecureAuth IDP – Device Fingerprinting Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by Bull
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

Bull

Improve Intrusion Detection with Effective Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores the threat management solution one organization chose to improve their intrusion detection.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Alert Logic

Detect and Investigate Advanced Threats on Endpoints
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Find out how RSA ECAT (Enterprise Compromise Assessment Tool) helps organisations reduce attacker dwell time and the time it takes to detect and validate compromised machines, and much more.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

RSA, The Security Division of EMC

Head First into the Sandbox
sponsored by Fortinet, Inc.
WHITE PAPER: Access this exclusive whitepaper now to learn about the evolution of sandboxing and explore some advanced evasion techniques.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Fortinet, Inc.

Market Surveillance and Monitoring
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper explores an out-of-the-box risk management solution that can help you deal with the demands of real-time financial markets.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Software AG

The Definitive Guide to Managing Cloud Security
sponsored by Cisco & Fujitsu
BOOK: This helpful book serves as a clear and unbiased guide to navigating the complexities of cloud security.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Cisco & Fujitsu

The Fortinet Security Census 2014
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper reveals the results of and IT security census of more than 1,600 qualified IT decision makers.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Fortinet, Inc.

Rosetta Stone Case Study: Improve Security and Compliance with Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores a threat management that can help you improve security and compliance.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Alert Logic

Secure Identity and Smart Employee ID Solutions
sponsored by Bull
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

Bull

How Alert Logic Helped BancBox to Protect Payment Information in the Cloud
sponsored by Alert Logic
WHITE PAPER: This white paper describes Alert Logic's collaboration with BancBox, a payment service provider, to find a way to protect payment information and meet PCI compliance mandates in a cloud environment.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Alert Logic

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

High Alert on Cyber-Risk and Cyber-Security Preparedness
sponsored by SurfWatch Labs
EGUIDE: This expert e-guide offers an in-depth exploration of cyber intelligence and covers why you need to be on high alert for cyber-risk and cyber-security preparedness.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

SurfWatch Labs
1 - 25 of 2856 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement