IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 3248 Matches Previous Page  |  Next Page
Innovation for the Cloud Generation: Blue Coat Answers Your Top 6 Questions for 2016
sponsored by Blue Coat Systems
RESOURCE: 6 of your top cloud security concerns will be laid to rest as the era of the cloud generation comes to fruition. Learn how to handle compliance, shadow IT, secure your data against advanced threats, and more.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Blue Coat Systems

Quantifying the Value of Firewall Management
sponsored by FireMon
WHITE PAPER: Learn how to reduce the total annualized business impact of managing firewalls without reducing the protection afforded by them. Access now to discover detailed models breaking down the costs and effectiveness of network firewalls, as well as upkeep, realistic examples of their use, and more.
Posted: 07 Dec 2016 | Published: 31 Oct 2016

FireMon

An MSP Guide to Selling IT Security
sponsored by LogicNow
WEBCAST: Discover a roadmap to enhance your MSP offering with security services, a detailed methodology in taking a layered security approach, and 5 tips for selling IT security. Access now to unveil how to expand upon your existing toolkit and evolve your MSP to an MSSP.
Posted: 07 Dec 2016 | Premiered: Dec 7, 2016

LogicNow

Turning Data Protection into a Game Changer for MSPs
sponsored by LogicNow
WHITE PAPER: Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogicNow

How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: This webinar discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

Designing an IAM Program Optimized for Your Business
sponsored by IBM
WHITE PAPER: Discover a step-by-step process on how to revamp your IAM and access policies to ensure that business objectives related to security, productivity or compliance can be met, both in the short term and as your organization continues to evolve in the future.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

IBM

Cloud IAM - TCO
sponsored by IBM
VIDEO: Learn how to stop the monotony of IAM, and instead turn it into a business enabler. By adding enterprise-grade identity-as-a-service (IDaaS), you'll be able to reduce costs by 60%, onboard SaaS apps 100 times faster and generate powerful access management from a single screen.
Posted: 07 Dec 2016 | Premiered: 30 Nov 2016

IBM

Buyers guide to cloud based I&M mgmt
sponsored by IBM
RESOURCE: Learn how to make the most informed decision about on your next enterprise grade IDaaS provider with this buyer's guide.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

IBM

Why Securing Your Docker Containers Should Be Top Priority
sponsored by NeuVector
EGUIDE: Learn the importance of securing Docker containers, how they can threaten the security of your enterprise, and how to mitigate the vulnerabilities presented by the technology.
Posted: 07 Dec 2016 | Published: 05 Dec 2016

TOPICS:  Linux | Security
NeuVector

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

Container Security: How to Secure Enterprise Container Stacks
sponsored by NeuVector
EGUIDE: Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure.
Posted: 05 Dec 2016 | Published: 02 Dec 2016

NeuVector

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security. Discover what lessons its limitations will teach you, such as: siloed security is not sustainable, fragmented data loss prevention decreases your chance of success, archiving must be defensible and e-discovery ready, and more.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

CW Europe: December 2016 - February 2017
sponsored by ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

ComputerWeekly.com

Three Golden Rules for Safe and Sound Endpoints
sponsored by IBM
RESOURCE: Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements.
Posted: 05 Dec 2016 | Published: 30 Nov 2016

IBM

Reducing Attack Surface: SANS' Survey on Continuous Monitoring Programs
sponsored by IBM
RESOURCE: Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one.
Posted: 05 Dec 2016 | Published: 30 Nov 2016

IBM

Are You Leaving the Door Open for Cyber Threats?
sponsored by Palo Alto Networks
WHITE PAPER: In this exclusive e-guide, learn how businesses can eliminate security boundaries and develop a resilient defense posture against readily-advancing threats. Read on to uncover how to choose the right firewall, enable steadfast security within virtually all type of apps, and more.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

Palo Alto Networks

The Cyber Threat Guide
sponsored by LogicNow
EBOOK: This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them.
Posted: 02 Dec 2016 | Published: 30 Nov 2016

LogicNow

Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY: In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Proofpoint, Inc.

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

HID

Important Modern Trends in Digital Banking
sponsored by HID
WHITE PAPER: Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

HID

The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Why Digital Business Needs a New Approach to Information Security
sponsored by Entrust, Inc.
WHITE PAPER: This resource details how companies are turning to new technologies which establish identity and promote trust in order to extend the reach of their digital businesses. Further, you will learn about today's security environment as it exists inside and outside of the office.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Entrust, Inc.

CW ANZ - December 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

SearchDataCenter.com
1 - 25 of 3248 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement