IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 3374 Matches Previous Page  |  Next Page
See What Matters: Closing Gaps in Network Visibility
sponsored by Gigamon
RESOURCE: Explore some of the top reasons why IT and security pros struggle to drive deep visibility across their networks and uncover strategies for closing critical gaps in network security.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon

Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
RESEARCH CONTENT: The Ponemon Institute takes a look at what 203 UAE IT security professionals have to say about their alignment of prevention, detection, and response capabilities to manage, mitigate, and move on from cyberattacks.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

IBM Resilient

Troubling Trends in Network Security
sponsored by Gigamon
RESOURCE: Learn about which key issues are complicating network security, making it significantly harder than ever before, and find out how to combat with strategies for automation, networking monitoring, and analytics.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon

Next-Generation Firewall 3301 Appliance v6.1.2 Vendor Scorecard
sponsored by Forcepoint
RESEARCH CONTENT: In this in-depth research report, gain insight into the actual performance of the new next-generation firewall; 3301 Appliance 6.1.2.
Posted: 22 Jun 2017 | Published: 06 Jun 2017

Forcepoint

8 Reasons to Consider SaaS-Based Infrastructure Monitoring
sponsored by LogicMonitor
WHITE PAPER: On-premise monitoring systems are struggling to keep up with new computing trends. This white paper discusses the eight central reasons to why you should consider SaaS for your infrastructure monitoring purposes.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

LogicMonitor

5 Steps to Eradicate Text Messaging Risk
sponsored by Smarsh
WHITE PAPER: Prohibiting the use of text messages in your organization does not protect you from risk - it simply hides it. Discover 5 steps on how to leverage text messaging more in your organization as a legitimate communication channel, while reducing your organization's compliance, legal and reputational risk.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

2017 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: More firms are finding that gaps in retention and supervision programs have consequences. Learn how to effectively identify and address non-compliant communications and other actions that pose risks to your firm.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

Overcoming the Human Factor with Visibility-Centric Security
sponsored by Gigamon
RESOURCE: Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Gigamon

What GDPR Means for Your Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: Due to the GDPR, compliance is mandatory by 25th May 2018. Access this whitepaper to discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell SecureWorks

Is Your IT Security Affecting Your Workforce Productivity?
sponsored by Dell India
WHITE PAPER: Read this infographic to learn more about the trends, drivers, and challenges organizations face in regards to their workforce security.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell India

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

Top 5 Reasons to Choose Dell EMC For Data Protection
sponsored by Dell EMC Intel®
WHITE PAPER: Discover 5 ways in which Dell EMC's data protections suite can give your business the enterprise-grade data protection you need to accelerate your digital transformation.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell EMC Intel®

Digital Certificates: Ensure Security with This 2-step Process
sponsored by Blue Cedar
WHITE PAPER: Digital certificates can provide a secure second factor for authenticating connected mobile apps. Uncover how to leverage them to secure your mobile devices.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Blue Cedar

Top 5 Reasons This Data Protection Suite Stands Out
sponsored by Dell EMC Intel®
WHITE PAPER: Go inside this white paper to learn about a family of data protection software designed to work in harmony to keep your information safe.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Dell EMC Intel®

5 Steps to Take Backup from Good to Great
sponsored by SolarWinds, Inc.
WHITE PAPER: Faulty or inefficient backup strategies and technology can hamper your business dramatically. Access this resource to discover 5 steps to improve your backup strategy today.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

SolarWinds, Inc.

Preparing for GDPR's Incident Response Challenges
sponsored by IBM Resilient
WHITE PAPER: "Only 25% of organizations say they have a cyber security incident response plan (CSIRP) that is applied consistently across the enterprise," said Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute. Uncover how to empower your organization to remain compliant to the GDPR and enable fast breach response.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

IBM Resilient

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: Uncover 4 critical factors organizations should consider before designing their GRC deployment so that they can properly satisfy key use case needs, mitigate risks, and meet compliance regulations.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Rsam

Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell India
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell India

Power of Proxy in Security
sponsored by Symantec & Blue Coat Systems
WEBCAST: With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threat, the "too many devices" problem, ensure compliance, and more.
Posted: 19 Jun 2017 | Premiered: Jun 6, 2017

Symantec & Blue Coat Systems

What Continuous Data Protection Looks Like
sponsored by Dell EMC and Intel®
VIDEO: Discover how to reduce risk while saving time and money securing your data center, whether you are looking for converged or hyper-converged systems to meet the right use case for your organization.
Posted: 19 Jun 2017 | Premiered: 20 Jun 2017

Dell EMC and Intel®

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform
sponsored by Gigamon
EBOOK: Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Gigamon

Report: Your Guide to Today's Healthcare Threat Landscape
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover 6 threats to your healthcare organization and how they have evolved over the past year, what specific dangers they pose to your healthcare organization, and what you can do to mitigate their harm.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec & Blue Coat Systems

Why Businesses Need a More Enlightened Approach to Phishing Attacks
sponsored by PhishMe
EGUIDE: Discover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.
Posted: 19 Jun 2017 | Published: 14 Jun 2017

PhishMe
1 - 25 of 3374 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement