IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
101 - 125 of 2978 Matches Previous Page  |  Next Page
Threat Defenses, Security Projects, and Cloud Security
sponsored by TrendMicro
EGUIDE: As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.
Posted: 06 May 2016 | Published: 29 Apr 2016

TrendMicro

Fighting IP Telephony Fraud
sponsored by Oracle Corporation
CASE STUDY: Review common IP telephony scams and learn how new security measures can help network administrators combat service theft and mitigate risks.
Posted: 05 May 2016 | Published: 05 May 2016

Oracle Corporation

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: Reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now and find out how to synthesize your IT operations and security controls to form an agile, increasingly automated (and rock-solid) security architecture.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
EBOOK: The average total cost of a data breach for companies increased 23% on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation through network virtualization allows your security team to focus on the problem areas and minimize resource usage. Access this e-book to learn more about this strategy to better secure your data.
Posted: 05 May 2016 | Published: 29 Apr 2016

VMware

Survey Results: Mapping the Cloud Maturity Curve
sponsored by IBM
WHITE PAPER: This resource presents survey results on cloud maturity. Discover the 5 essential characteristics of high-maturity organizations, and learn about the biggest challenges that hold enterprises back from achieving cloud maturity.
Posted: 05 May 2016 | Published: 05 May 2016

IBM

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Client Virtualization Solutions Made Simple
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: This white paper details how client virtualization strategies have made it simpler to procure, deploy, scale, and manage virtual desktops. Read on and you'll learn the benefits of deploying client virtualization strategies using hyper-converged systems.
Posted: 04 May 2016 | Published: 04 May 2016

Dell, Inc., Intel and VMware

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Customer Story: Kuwait Petroleum Corporation
sponsored by Citrix
CASE STUDY: Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.
Posted: 04 May 2016 | Published: 31 Dec 2013

Citrix

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. Find our how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.
Posted: 03 May 2016 | Published: 03 May 2016

Dell, Inc., Intel and VMware

Brasfield and Gorrie builds productivity and security with paperless collaboration
sponsored by Citrix
MICROSITE: Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.
Posted: 03 May 2016 | Published: 31 Dec 2013

Citrix

Client Virtualization for Higher Education Delivers Greater Mobility, Increased Security, and Savings
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: Today's students are accustomed to accessing data from any device, any location, at any time. But can their educational work styles be the same? This white paper details how client virtualization provides a simple way to seamlessly access data and apps across any device, enabling a mobile work style that improves student engagement and success.
Posted: 03 May 2016 | Published: 03 May 2016

Dell, Inc., Intel and VMware

SCIENCELOGIC: Unmatched Visibility into Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improve efficiency and, most importantly, security by reviewing their code before their products hit the market so they knew exactly what to change.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

A Computer Weekly Buyer's Guide to Access Control
sponsored by ComputerWeekly.com
EBOOK: In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Internet of Things Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.
Posted: 26 Apr 2016 | Premiered: 01 May 2016

SearchSecurity.com

Building the Next-Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: Discover how you can construct an IP layer in order to facilitate a wide variety of new communications services, devices and applications. It also discusses managing this proliferation of new features utilizing the IP layer, despite ever-growing complexity.
Posted: 26 Apr 2016 | Published: 06 Apr 2016

Oracle Corporation

Communications Security: A Blueprint for Enterprise Session Border Controller Deployments
sponsored by Oracle Corporation
WHITE PAPER: Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.
Posted: 26 Apr 2016 | Published: 31 Aug 2015

Oracle Corporation

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix
101 - 125 of 2978 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement