IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 3026 Matches Previous Page  |  Next Page
Secure Digitization for Smaller Organizations
sponsored by Cisco
RESOURCE: Discover two use cases of small business owners and the path that led them to become "secure digitizers", enabling a first-move advantage in terms of digitization for a smaller organization. Read on to learn how to secure roaming users, implement secure guest access, scale security along with the network, and more.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Cisco Leads Again in NSS Breach Detection Test
sponsored by Cisco
WHITE PAPER: Learn how to reduce time to detection and increase detection rate. Read on to learn how to reduce the space and time attackers have to harm your organization.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Crafting an insider threat program: Why and how
sponsored by SearchSecurity.com
EBOOK: Tackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.
Posted: 23 Jan 2017 | Published: 20 Jan 2017

SearchSecurity.com

Why Mobile Devices are the Biggest Enterprise Security Threat
sponsored by BlackBerry
WEBCAST: Mobile devices are the biggest threat to your enterprise. Why? Because you are not managing them correctly, which leaves company and user data extremely vulnerable. In this webcast, learn how you can enable your employees to be more productive with mobile devices while still protecting corporate assets.
Posted: 23 Jan 2017 | Premiered: Oct 31, 2016

BlackBerry

Six Tools Users Need for Mobile Files and How to Provide Them Securely
sponsored by BlackBerry
WHITE PAPER: Integrated solutions are emerging that enable users to do all of the things they need to with their files on mobile devices. This white paper identifies and details the 6 tools users need for mobile files and outlines what you should consider in evaluating these solutions.
Posted: 23 Jan 2017 | Published: 14 Oct 2016

BlackBerry

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

Reinventing Data Protection for Digital Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Uncover the strategies your organization can use to overcome the data complexities of the modern reality of data. Learn the growing importance of data as an asset, as well as the need for new data protection and management strategies fit for purpose.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Hewlett-Packard Enterprise

How to Build Application Security into The Entire SDLC
sponsored by TechData - HPE
WHITE PAPER: Get a rundown of not only how app security should ideally work, but also how to tailor your security measures to match your enterprise's needs.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

TechData - HPE

The Smarter SMB’s Guide to Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works as well as the most common variants that are active today.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Barracuda Networks

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape. Learn what should be covered, how, and common issues associated with choosing the one right for you.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

Five Ways to Protect Your Digital Assets
sponsored by Hewlett-Packard Enterprise
RESOURCE: Discover not only a rundown of the threats that you need to prepare for if disaster strikes, but also the data backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards.
Posted: 19 Jan 2017 | Published: 01 Jan 2016

Hewlett-Packard Enterprise

Security Everywhere: A Growth Engine for the Digital Economy
sponsored by Cisco
WHITE PAPER: Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

How Open Source Subscriptions Deliver Business Value
sponsored by Red Hat
WHITE PAPER: Transferring to open source software (OSS) requires careful guidance to ensure security and maximize ROI during execution. Access this white paper to learn what to look for in an OSS vendor to guide your transition and see what one company offers as part of their customer experience.
Posted: 19 Jan 2017 | Published: 30 Dec 2016

Red Hat

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Data Security for Small to Midsize Businesses
sponsored by Hewlett-Packard Enterprise
WEBCAST: Learn how to counter the threats that are targeting your enterprise's data, productivity, revenue, and customers. Discover the questions that you need to ask yourself, such as do you have a pervasive security strategy? Are you ready for a mobile workforce? And more.
Posted: 18 Jan 2017 | Premiered: May 30, 2016

Hewlett-Packard Enterprise

Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

2017 Will be an Exciting Year for IT
sponsored by Splunk
WHITE PAPER: See what this year will hold for cloud, IoT and business analytics, IT operations and DevOps, machine learning, and security. Read on to explore the predictions for the IT field in 2017.
Posted: 18 Jan 2017 | Published: 31 Dec 2016

Splunk

LISTEN TO YOUR DATA Profiles of Customer Success With the Splunk® Platform
sponsored by Splunk
WHITE PAPER: This e-book highlights a series of case studies that detail how a wide range of organizations have utilized the Splunk platform in real-world environments to solve problems, such as gain a better understand their digital audience, build a better business process, determine the highest value leads, and more.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Splunk

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

3 Strategies to Keep Your Business Running Safely and Securely
sponsored by Hewlett-Packard Enterprise
RESOURCE: In this infographic, discover 3 IT strategies for keeping your data both secure and accessible to your employees.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Hewlett-Packard Enterprise

Managing Risks and Mitigating Threats in Today's IT Environment
sponsored by TechData - HPE
WHITE PAPER: In this white paper, learn about a complete security platform that takes a risk-based, adversary-centric approach to threat protection to ensure your IT environment remains protected.
Posted: 17 Jan 2017 | Published: 31 Mar 2016

TechData - HPE

Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise
1 - 25 of 3026 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement