IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
126 - 150 of 3609 Matches Previous Page  |  Next Page
How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

Understanding your Full Public Key Infrastructure (PKI) Potential
sponsored by DigiCert
EGUIDE: This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.
Posted: 06 Sep 2017 | Published: 31 Aug 2017

DigiCert

Four Kinds of Password Management
sponsored by LogMeIn, Inc.
RESEARCH CONTENT: Good password management can mitigate security risks. Take a look at this research content to reveal Gartner's 4 distinct topics that fall under password management.
Posted: 06 Sep 2017 | Published: 01 Mar 2017

LogMeIn, Inc.

Changing Password Behavior with Real Data
sponsored by LogMeIn, Inc.
WHITE PAPER: Check out this case study to learn about how Matt Shafer, IT Manager at Informz, overcame the issue of an open sharing password platform by implementing a password security posture that allows team leaders to centrally control shared passwords.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.

Optimize network performance and availability
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to deliver a flexible network environment to support employees and customers in any location, on any device, with optimized performance and availability.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

Citrix

Credit where Credit is Due
sponsored by Armor
CASE STUDY: Read this case study to uncover how Baxter Credit Union overcame its difficulty of accessing financial data easily and securely by implementing cloud-based software.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

Managed Cloud Security Services
sponsored by Armor
CASE STUDY: "It's worth it for the time savings alone. I'm no longer chained to my desk, watching the logs stream all day, Armor Anywhere CORE is the ideal solution for a small, vertically integrated IT organization with one or more people wearing multiple hats." -- Chris Jones | CTO/CPO, MetricAid
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

6 Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: It is difficult to defend against something when you do not know what exactly you are defending against. Take an in-depth look at this white paper to uncover 6 steps to implementing a risk-based security approach to enhance your security posture.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

Moving at the Speed of Byte: Ushering the Era of the Digitally Enabled Financial Institution
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to embrace a digital strategy that embeds digital innovations into the existing customer experience, brings customers and employees together on the same platform, and enables desired sales in cross-selling and upselling.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Citrix

Australian Privacy Act 1988 Amendment Explained
sponsored by Dell SecureWorks
WHITE PAPER: The amendments to the Privacy Act 1988 are going to force sweeping changes to the attitude around cybersecurity in Australia. This white paper explains who these amendments affect and what they mean for you.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

Taking Mobility to the Bank
sponsored by Citrix
WHITE PAPER: Discover the top factors that drive financial services IT leaders to embark on mobility, despite security concerns.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Citrix

Managing the Brainstorm
sponsored by Armor
CASE STUDY: In this case study, find out why ThinkTank sought out a security monitoring technology to protect their clients 'big ideas' and their growing data demands that supports their cloud services platform.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

Armor Complete's Intelligent Security Model: A Closed-loop System that Actively Learns how to Combat Threats
sponsored by Armor
WHITE PAPER: In this white paper, discover how an Intelligent Security Model (ISM) delivers a high level of security and compliance while actively learning how to combat threats.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

Finding a Password Manager for your Business
sponsored by LogMeIn, Inc.
EBOOK: 81% of confirmed data breaches involve weak, default, or stolen credentials. Don't let the password security disconnect between IT and employees increase the potential for a threat to your system. Inside this e-book, uncover 7 strategies your password manager should contain.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

LogMeIn, Inc.

Basic SIEM Analytics Steps to Know
sponsored by TechTarget
RESOURCE: All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization.
Posted: 02 Sep 2017 | Published: 02 Sep 2017

TOPICS:  Security
TechTarget

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: Find out how attackers launch different types of DDoS so that you can prepare your organization's security strategy to protect the key apps and data on its network.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

A10 Networks

Cybersecurity 101: The Fundamentals of Today's Threat Landscape
sponsored by Kaspersky Lab
EBOOK: In this e-book explore the growing trend of ransomware attacks and prevention tips for enhancing cybersecurity with automation techniques.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Evolution of the Online Battlefield
sponsored by Armor
WHITE PAPER: From botnets to APTs and DDoS attacks, learn more about the history of cyberattacks and how they've shaped the current threat landscape.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

The Complexities of the Secure DIY Cloud
sponsored by Armor
WHITE PAPER: Private and DIY clouds present critical implementation and management challenges when it comes to security and compliance. Learn how to simplify cloud security by anticipating the complexities of cloud migration and adoption.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

Owner-controlled PKI: The Next Step in Securing IoT
sponsored by DigiCert
EGUIDE: Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

DigiCert

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Rising value, falling cost: App and desktop virtualization
sponsored by Citrix
WHITE PAPER: Download this white paper to discover an affordable way to enable mobility and agility while maintaining control and security with desktop virtualization.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Citrix
126 - 150 of 3609 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement