IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
101 - 125 of 3122 Matches Previous Page  |  Next Page
The Threats Facing Financial Service Institutions in 2016
sponsored by Verizon
RESOURCE: Understand the nature of the security threat facing financial enterprises in 2016. Inside this paper you will find a quick, granular discussion of the sorts of attacks your network will be facing this year, and ways to inoculate your data from harm or theft.
Posted: 06 Jun 2016 | Published: 29 Apr 2016

Verizon

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell Software
WHITE PAPER: This paper discusses the multi-vendor nature common to most high-profile security breaches in retail enterprises. Learn about several of the characteristics common to recent breaches, and uncover a blueprint for a viable security model to prevent breaches in retail networks.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Securing the Small Business Network
sponsored by Dell Software
WHITE PAPER: In this resource, discover how to effectively secure your small business that faces an evolving threat landscape. Read on to explore eight challenges surrounding network security, and what you can do to mitigate and prevent any further attacks.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Why Threat Intelligence is Critical for Next Generation Firewalls
sponsored by Dell Software
WHITE PAPER: Read this paper and discover how a top-tier threat intelligence network makes the difference between an effective next-generation firewall and a mediocre one when it comes to defeating zero-day attacks and other advanced threats.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Free Yourself from Old-School PC Tools
sponsored by MobileIron
WHITE PAPER: Take a look at the significant improvements new devices have made and learn about how managing all of them can be boiled down to a single enterprise mobility management solution that eases both management and security.
Posted: 03 Jun 2016 | Published: 25 May 2016

MobileIron

Are Next-Gen Firewalls the Best Defense Against Cyber Attacks?
sponsored by Dell Software
WHITE PAPER: Discover how next-generation firewalls provide you with a robust, reliable defense against cyber attacks. Find out how you can protect your network and your business by applying the right security technology.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER: With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

The Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: Enterprise mobility management (EMM) is one big key to unlocking mobility's full potential. We had previously required a variety of solutions to deal with every aspect of mobile management. Now there is an EMM solution that does it all. Read on to learn more about EMM and this simplifying solution.
Posted: 03 Jun 2016 | Published: 31 May 2016

MobileIron

Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

IDC: Best Practice in Deploying Enterprise Mobility
sponsored by MobileIron
CASE STUDY: We all know that mobility is the new nature of business. It's unavoidable if you want to stay competitive. Explore four case studies that discuss different approaches to enterprise mobility and see what different businesses around the world have learned about the nautre of successful mobile deployments.
Posted: 03 Jun 2016 | Published: 31 Dec 2012

MobileIron

Solution at a glance - Citrix NetScaler and Cisco Application Centric Infrastructure
sponsored by Citrix
WHITE PAPER: Two major companies have come together to produce a joint solution that improves application performance and delivers agility through data center automation. Read on to gain an understanding of how your business will benefit from this solution.
Posted: 03 Jun 2016 | Published: 25 May 2016

Citrix

Extending Your IT Infrastructure to the AWS Cloud
sponsored by Amazon Web Services
VIDEO: Find out how you can seamlessly and securely integrate cloud resources into your existing IT infrastructure. You'll learn how you can benefit from adopting a hybrid cloud architecture.
Posted: 02 Jun 2016 | Premiered: 13 Feb 2013

Amazon Web Services

Prevent Insider Threats with UBA
sponsored by Exabeam
WHITE PAPER: Not all threats exist outside your organization. Insider threats could be potentially worse if they go undetected—leaking critical information. So how do you distinguish an insider attack, and more importantly, how do you stop them? Find out in the following exclusive white paper.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Exabeam

MobileIron Named a Leader in Enterprise Mobile Management Report
sponsored by MobileIron
RESOURCE: Find out how the top 11 enterprise mobile management (EMM) vendors stack up against each other when compared against an expert 25-criteria evalutaion.
Posted: 02 Jun 2016 | Published: 04 Dec 2015

MobileIron

Sky case study
sponsored by MobileIron
CASE STUDY: Europe's leading entertainment company noticed an increase in tablet usage among its sales staff. They needed an enterprise mobility management (EMM) solution that enabled device management and enhanced security. Read on to learn how one solution increased innovation for this industry leader.
Posted: 02 Jun 2016 | Published: 01 Jun 2016

MobileIron

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

Client Virtualization Solutions Made Simple
sponsored by Dell, Inc.
WHITE PAPER: This white paper details how client virtualization strategies have made it simpler to procure, deploy, scale, and manage virtual desktops. Read on and you'll learn the benefits of deploying client virtualization strategies using hyper-converged systems.
Posted: 02 Jun 2016 | Published: 04 May 2016

Dell, Inc.

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell, Inc.
WHITE PAPER: Along with adapting to highly demanding and increasingly mobile customers, your institution needs to empower your employees to be productive and responsive. Find out how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.
Posted: 02 Jun 2016 | Published: 03 May 2016

Dell, Inc.

Client Virtualization for Higher Education Delivers Greater Mobility, Increased Security, and Savings
sponsored by Dell, Inc.
WHITE PAPER: Today's students are accustomed to accessing data from any device, any location, at any time. But can their educational work styles be the same? This white paper details how client virtualization provides a simple way to seamlessly access data and apps across any device, enabling a mobile work style that improves student engagement and success.
Posted: 02 Jun 2016 | Published: 03 May 2016

Dell, Inc.

User Behavior Analytics: Track Individual Data and Activities in Your Network
sponsored by Exabeam
EGUIDE: Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.
Posted: 01 Jun 2016 | Published: 24 May 2016

Exabeam

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Four security tips for HIPAA compliance in healthcare cloud storage
sponsored by Pure Storage
EGUIDE: No risks can be taken when it comes to healthcare information storage. This is deterring many healthcare IT professionals from taking advantage of cloud storage opportunities. Read on to uncover four security tips that will keep your healthcare cloud storage in compliance with HIPAA standards.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

Nemours case study
sponsored by MobileIron
CASE STUDY: Privacy is a top priority in the healthcare industry and, as such, security is of the utmost importance. As mobile devices become more prevalent in healthcare, ensuring security for these devices becomes a necessity. Uncover a case study about a healthcare provider that gave its employees secure mobility with a single solution.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron
101 - 125 of 3122 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement