IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
126 - 150 of 2823 Matches Previous Page  |  Next Page
Financial Services Industry: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This report offers a high-level overview of the major threats trending across businesses worldwide over the past year. Access now for insight into the current threat landscape for the financial services industry and offers solutions that can help you better protect your organization overall.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

IBM

The Rise of Ransomware & How to Defend Against It
sponsored by Sentinel Labs, Inc.
EGUIDE: This white paper teaches you how ransomware operates and what you can do to ensure you don't become a victim. Download now and learn how to avoid infection and how to remedy your endpoints if you are infected.
Posted: 14 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Gartner 2015 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

How to Handle a Ransomware Hijacking
sponsored by ESET
WHITE PAPER: This white paper reinforces the important precautions of secure mobile management in the enterprise. Uncover the global state of ransomware attacks, preventative measures you can take, and what to do if your organization gets infected.
Posted: 09 Mar 2016 | Published: 09 Mar 2016

ESET

Next Generation Endpoint Protection Buyer's Guide
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about next-generation endpoint protection that can detect and prevent threats on endpoints using a unique behavior-based approach.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Report: (In)Security Everywhere in 2016
sponsored by ESET
WHITE PAPER: In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

ESET

Tips from a Security Researcher: Choose the Right Anti-Virus Solution for your Business
sponsored by ESET
WHITE PAPER: In this tech brief, one analyst urges you to look at several different antivirus solutions and come up with a short list of three vendors. Access now for details on three steps to take when searching for an anti-virus solution that fits your needs.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

ESET

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

Data Center vs. Remote Site IT
sponsored by Riverbed Technology, Inc.
WEBCAST: This video shows how you can use converged architecture to make sure your remote sites are as secure and efficient as your main data center.
Posted: 07 Mar 2016 | Premiered: Mar 7, 2016

Riverbed Technology, Inc.

Secure Retail Eases the BlackBerry to iOS Transition
sponsored by IBM MaaS360
CASE STUDY: In this white paper, you will discover a comprehensive security solution for iOS devices that has a clean and intuitive interface with easy reporting and usage tracking for expense management. Read on to meet your key functionality requirements for your mobile policies and safely incorporate iOS into your MDM.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

IBM MaaS360

How to Mobilize your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.
Posted: 07 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Computer Weekly March 2016: Building Data Centers Under the Sea
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, delve into Microsoft's trial of an underwater data center and assess the technology and environmental implications. In addition, read on to see if the desktop PC is set to be reinvented as PC suppliers build new products around Windows 10. Read the issue for these highlights, and more.
Posted: 04 Mar 2016 | Published: 08 Mar 2016

ComputerWeekly.com

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Make Endpoint Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®

The Benefits of Investment in Threat Detection
sponsored by ThreatConnect
EGUIDE: This e-guide shows you the value of advanced threat intelligence and why you shouldn't skimp when it comes to protecting your organization's valuable data. Access now for examples from various IT companies about how they justify spending money without seeing a tangible ROI.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

ThreatConnect

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Stay in Sync, Securely
sponsored by SearchSecurity.com
EBOOK: Secure file sync and share can be achieved in your enterprise. In this three-part guide, our security experts explain how.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

SearchSecurity.com

Information Security ANZ March 2016
sponsored by TechTarget ANZ
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016


IBM Report: Securing the C-suite
sponsored by IBM
WHITE PAPER: This white paper helps you understand the risks and vulnerabilities your network probably has and how to stop them from being exploited.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

IBM

Information Security Asean March 2016
sponsored by TechTarget ANZ
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Mobile Device Management Policies: Best Practices Guide
sponsored by IBM MaaS360
WHITE PAPER: Your company's data is priceless, so protecting it should be your number one priority, without jeopardizing employee productivity. In this white paper, you will discover 10 best practices for MDM, including guidance on how to distribute settings Over the Air (OTA), enforce encryption, and more.
Posted: 03 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

8 Reasons Streamlining Network Security Should be your Top Priority
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this brief resource to find testimonials from network analysts, IT directors, and security offers on strategies they used to efficiently gain greater visibility into network security.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

How can proper BYOD and IoT device onboarding improve
sponsored by Ruckus Wireless
EGUIDE: This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless
126 - 150 of 2823 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement