IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
101 - 125 of 3229 Matches Previous Page  |  Next Page
How Proper Key Management Can Protect Your Data
sponsored by Hewlett Packard Enterprise
WHITE PAPER: With a shift on the threat landscape from simple to sophisticated, ensuring the highest level of reliability, availability, and disaster recovery seems a lofty goal. Discover what role key management can play in critical data protection and business continuity architecture.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

Hewlett Packard Enterprise

Choosing the Right Provider for Mobile and Cloud Security
sponsored by MobileIron
WHITE PAPER: Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

MobileIron

Closing the Skills Gap: Leveraging Automated Analytics for Cybersecurity
sponsored by RSA
WHITE PAPER: This white paper explores how to bring automated analytics to bear and bolster your cybersecurity strategy. Overcome the talent shortage and discover how to leverage machine learning, AI, and cognitive capabilities in order to integrate analysis of user behavior patterns into incident detection.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

RSA

Security vs. Constant Change: How to Gain Continuous Security Validation
sponsored by AttackIQ
WHITE PAPER: Discover how to provide your organization with continuous validation of security fidelity, set your enterprise up to evolve your security controls to keep pace with its constantly changing adversaries, and address cracks in your security including the complexity of your infrastructure, a scarcity of skilled resources, or controls erosion.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

AttackIQ

Stopping Cyberattacks before they occur: Farsight Security DNS Threat Intelligence - The Red Canary Case Study
sponsored by Farsight Security
CASE STUDY: In this case study learn how Red Canary, a cybersecurity firm, improved Its passive DNS threat intelligence, confirmed and enriched investigative findings, installed a primary and secondary, high fidelity threat indicator, and more.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

Farsight Security

The Evolving Role of Managed Security Service Providers
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, we look at the evolution of the managed security provider and why services are the fastest-growing part of security.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

SearchSecurity.com

The Future of DLP is Automation
sponsored by Ghangor Cloud
WHITE PAPER: Discover the evolution of data loss prevention from its origins to today and shine a light on the future of DLP and the role of automation as a driving factor in its effectiveness.
Posted: 03 Apr 2017 | Published: 30 Mar 2017

Ghangor Cloud

Your Guide to Kingslayer: The Anatomy of a Supply Chain Attack
sponsored by RSA
RESEARCH CONTENT: This postmortem report can help your organization prevent the next loss of business or mission critical information from a sophisticated exploitation campaign, diving in-depth into the Kingslayer attack.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

RSA

11 Security Analytics Providers Slug It Out
sponsored by RSA
RESEARCH CONTENT: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 03 Apr 2017 | Published: 06 Mar 2017

RSA

Top Internet of Things Security Concerns
sponsored by Peak10
WHITE PAPER: 70% of IoT ready devices are vulnerable to hackers, and there doesn't look like there's an easy answer to fixing it. Learn what the trajectory towards a secure future state for IoT is shaping up to look like.
Posted: 03 Apr 2017 | Published: 02 Mar 2017

Peak10

See How a Major National Security Agency Protects its Sensitive Data
sponsored by Ghangor Cloud
CASE STUDY: Discover how a leading southeast Asian country's national security agency recently upgraded their data leak prevention mechanisms. Learn how they were able to safeguard sensitive national security information, financial transaction information and other confidential mission critical information.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Ghangor Cloud

How The Mirai Botnet is Fueling Today's Largest and Most Crippling DDoS Attacks
sponsored by Akamai
WHITE PAPER: The largest DDoS attacks have increased greatly in strength and doubled in attack size in 2016. Access this whitepaper to uncover how to defend against DDoS attacks and stay ahead of the malicious threats like the Mirai botnet.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Akamai

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Security Insights Magazine: 3 Accelerating Cybersecurity Trends
sponsored by DynTek
RESOURCE: In this resource, Intel's VP and CTO, Brett Kelsey, gives an in-depth interview on today's must-know cybersecurity trends. Additionally you'll learn how to forge a risk-based security strategy and where you cybersecurity gaps are.
Posted: 03 Apr 2017 | Published: 30 Dec 2016

DynTek

Security: Making a Better Case for Technology in the Classroom
sponsored by Absolute
WHITE PAPER: Explore how educators can ensure the security and efficacy of desktop and mobile devices used by students and staff in K–12 schools while reducing IT administration and management demands and remaining compliant.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Absolute

4 Steps to Achieve Your CISSP Certification
sponsored by TechTarget
RESOURCE: Becoming a CISSP can open doors in your security career and improve your earning potential, so don't delay in obtaining our free CISSP study guide. Take our Web Security Survey to receive access to CISSP Prep: 4 Steps to Achieve Your Certification.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

TechTarget

7 Critical Considerations for Choosing a Cloud Security Provider
sponsored by Akamai
WHITE PAPER: Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premises infrastructure with security measures in the cloud and uncover the 7 key factors to consider when evaluating a cloud provider.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Akamai

Connectivity Options For Microsoft Office 365
sponsored by Zscaler
WHITE PAPER: In September 2016, Microsoft introduced new guidance on best practices for enterprises looking to deploy Office 365. In these guidelines, learn how Office 365 was built to be accessed securely and reliably via a direct Internet connection.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Zscaler

What is Enterprise Mobile Security?
sponsored by Lookout
EBOOK: Download this eBook to find out why EMM and MDM are not enough to ensure a secure mobile enterprise and understand where the fault lies in today's EMM/MDM initiatives.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Lookout

Understanding Cyberthreat Motivations to Improve Defense
sponsored by McAfee, Inc.
RESOURCE: Threat agents are human, and fully understanding their threat requires understanding what human drives are involved. Uncover the 10 major elements motivating threat agents to help improve your defenses.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

McAfee, Inc.

5 Reasons Enterprises Need a New Access Model
sponsored by Akamai
WHITE PAPER: As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new access management model.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai

Mobile Security: The 6 Questions Modern Organizations are Asking
sponsored by Lookout
WHITE PAPER: As Gartner says, "It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Learn about six vital mobility areas that enterprises are concerned about, including the lack of visibility, protection, vulnerabilities, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Lookout

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

MobileIron and Microsoft's Intune MDM Go Head-to-Head in EMM offering
sponsored by MobileIron
WHITE PAPER: Uncover the key differences between MobileIron and Microsoft's Intune. Learn how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

MobileIron

Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: The business world has been increasingly mobile for years, but it hasn't been until now that cyberthreats have been aimed at mobile devices. Unified endpoint management has come to integrate augmented intelligence and cognitive technology. Access this white paper to learn how these two technologies are improving mobile security.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM
101 - 125 of 3229 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement