IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
101 - 125 of 3483 Matches Previous Page  |  Next Page
A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Google Cloud

How To Become A Superstar Security Leader
sponsored by Google Cloud
ANALYST REPORT: As companies seek to innovate and engage customers through digital channels, they need superstar security leaders. This report looks at the biggest changes in firms' expectations of their chief information security officers and provides specific examples of how top information security professionals rise to those occasions.
Posted: 18 Oct 2017 | Published: 13 Feb 2017

Google Cloud

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

The Perfect Rx for HIPAA Compliance
sponsored by AlienVault
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

From HummingBad to Worse: The History of the Yingmob
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Inside, learn about the malware known as HummingBad, the main tool of the Chinese cybercriminal group Yingmob. Find out what damage this malware can do, how it went global, and more.
Posted: 18 Oct 2017 | Published: 30 Dec 2016

Check Point Software Technologies Ltd.

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

The Mobile Banker Threat - from End to End
sponsored by Check Point Software Technologies Ltd.
RESOURCE: This resource offers an example of one strain of malware which infected Google Play, and shows you how easy it is for it to mutate, grow, and change to beat even advanced AVs. Read on to learn what you should do to protect yourself from these threats.
Posted: 17 Oct 2017 | Published: 17 May 2017

Check Point Software Technologies Ltd.

ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.
Posted: 17 Oct 2017 | Published: 14 Sep 2017

Check Point Software Technologies Ltd.

2017 Veritas GDPR Report Chapter 1
sponsored by Veritas
WHITE PAPER: According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas

Security and Compliance Strategies for Success
sponsored by Citrix
EBOOK: Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

Enterprise Cloud Applications & Services Adoption, Use, and Content and Threats
sponsored by Symantec
RESEARCH CONTENT: In this Symantec CloudSOC Shadow Data Report, uncover the key challenges that enterprises face when trying to ensure their sensitive data in cloud apps remains secure.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Symantec

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

The Buck Stops Where?
sponsored by BitSight
WHITE PAPER: By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

BitSight

Symantec™ Cloud Generation Malware Analysis
sponsored by Symantec
WHITE PAPER: Hackers continue to show endless ingenuity in penetrating corporate networks with malware, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about defeating malware.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Mobile Malware in the UK
sponsored by Lookout
WHITE PAPER: The average malware infection on a mobile device costs £6,400. With the rise of employees using mobile devices for work, companies need to be aware of the high cost and vulnerability of malware attacks. This white paper offers a malware case study to help organizations fight back against mobile threats.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

All You Need to Know About Microsoft Windows Server 2016 Virtualization
sponsored by Veeam Software
EBOOK: In this comprehensive e-book you will find examples of how IT Professionals are leveraging Hyper-V PowerShell scripts in their own environments. Learn about the necessary tools to successfully test and manage a Windows Server 2016 Hyper-V environment.
Posted: 13 Oct 2017 | Published: 30 Dec 2016

Veeam Software
101 - 125 of 3483 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement