IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 3331 Matches Previous Page  |  Next Page
Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs – by taking a comprehensive approach to security at all points of the customer's journey.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

Ransomware and Cloud Security: Keys to Stop the Threat
sponsored by Cisco Umbrella
EGUIDE: Around the clock security attacks are becoming more challenging and creative. Inside this e-guide, information security consultant Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and Kathleen Casey uncovers 5 ways to fend off cloud security threats.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Compliance in Full Throttle in 2017
sponsored by Rsam
EGUIDE: According to the TechTarget IT Priorities 2017 survey, nearly two-thirds of respondents reported that their organizations plan to implement compliance initiatives this year. Inside this e-guide uncover why compliance is in full throttle in 2017 and the benefits of compliance and information governance process alignment.
Posted: 27 Jul 2017 | Published: 21 Jul 2017

Rsam

Security Hygiene & Other Cybersecurity Tips That Could Save Your Business
sponsored by AdvizeX Technologies
WHITE PAPER: Today there is a multibillion-dollar industry of criminals who want to harvest and resell your sensitive data. The world is only becoming more and more dangerous, and you likely won't be able to stop every single attack you encounter. Access this white paper to learn how you can create a solid foundation to protect your organization and customers.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

TOPICS:  Security
AdvizeX Technologies

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

How LepideAuditor Helps You Detect and Prevent Ransomware Spread
sponsored by Lepide Software
WHITE PAPER: Learn about the important role of security audits in defending against increasingly complex ransomware attacks. Discover how to get real-time insights into changes in the configuration of systems like Active Directory, Exchange Server, and NetApp Filers.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

AWS Agility + Splunk Visibility = Cloud Success
sponsored by Splunk
RESOURCE: Download this infographic to discover the app that provides countless possibilities for operational and security visibility in the cloud on AWS.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Splunk

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Security Product Overview: Cisco Umbrella
sponsored by Cisco Umbrella
VIDEO: Over ½ of the PCs in organizations are mobile – which means you need to protect your workforce wherever they access the internet. In this product introduction, learn about Cisco Umbrella, a cloud-delivered network security service that protects any device, anywhere.
Posted: 27 Jul 2017 | Premiered: 11 Nov 2016

Cisco Umbrella

HyperConvergence or Hyper-Security? What's Right for Your Enterprise?
sponsored by HyTrust
WHITE PAPER: To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

HyTrust

SiliconANGLE Spotlight: HyTrust
sponsored by HyTrust
VIDEO: Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.
Posted: 27 Jul 2017 | Premiered: 27 Jul 2017

HyTrust

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

How to Track Privileged Users' Activities in the Active Directory
sponsored by Lepide Software
EBOOK: Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

How LepideAuditor Helps You Detect and Prevent Insider Threats
sponsored by Lepide Software
EBOOK: Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

The Smart, Secure Cloud for the UK
sponsored by Google Cloud
WHITE PAPER: This document gives an overview of how security is designed into Google's technical infrastructure. Read on to learn about the lengths to which Google has gone to provide a level of security that you need in order to have confidence in your cloud deployments.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Google Cloud

A Look at the Shared Responsibility Model for Cloud Providers
sponsored by SolarWinds, Inc.
EGUIDE: Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

What's New in the World of Managed Security Providers?
sponsored by SolarWinds, Inc.
EGUIDE: Go inside this expert guide to explore the 2 major ways managed security service providers have changed in recent years.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

AI, Risk-Based and Context: Trading in Your Password for the Intelligent Future
sponsored by Crossmatch
TRANSCRIPT: Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Crossmatch

Yelp Improves Their Security Posture: Umbrella Customer Experience
sponsored by Cisco Umbrella
VIDEO: Hear from Yelp's Head of Security Vivek Raman about how his team used Cisco Umbrella to automate and improve their incident response. Find out how they enhanced their ability to protect sensitive employee data, respond to incidents faster, defend against advanced malware, and more.
Posted: 26 Jul 2017 | Premiered: 01 Jun 2017

Cisco Umbrella

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Composite Authentication: The Evolution Beyond 2FA/MFA
sponsored by Crossmatch
PODCAST: In this podcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 26 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Tool Overview: HyTrust Multi-Cloud Security and Automated Compliance
sponsored by HyTrust
PRODUCT OVERVIEW: In this technology brief, learn about HyTrust Multi-Cloud Security and Automated Compliance, security software for a multi-cloud infrastructure. Discover key features and benefits, and how you can implement this tool for your own enterprise security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Improving Endpoint Security and Signature-Based Detection
sponsored by Sentinel Labs, Inc.
EGUIDE: Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Sentinel Labs, Inc.
1 - 25 of 3331 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement