IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
151 - 175 of 3396 Matches Previous Page  |  Next Page
A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Data Security in Higher Education
sponsored by J2 Cloud Services
RESOURCE: In this resource, discover how cloud faxing delivers a fast, secure, and more convenient fax service that increases satisfaction among university administration and students.
Posted: 13 Sep 2017 | Published: 14 Dec 2016

J2 Cloud Services

How Cloud Faxing Protects Confidential Customer Information
sponsored by J2 Cloud Services
RESOURCE: In this resource, recognize the risks associated with traditional faxing and learn how cloud faxing can help prevent big data breaches.
Posted: 13 Sep 2017 | Published: 23 Dec 2016

J2 Cloud Services

Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

ComputerWeekly.com

How Hybrid Approaches to Data Infrastructure Keep you Protected 24/7
sponsored by J2 Cloud Services
WHITE PAPER: In this online resource, learn how a hybrid approach to data infrastructure gives your business an increased level of reliability, adaptability, and agility for a more advanced data sharing capability.
Posted: 12 Sep 2017 | Published: 02 Jun 2017

J2 Cloud Services

eFax Corporate Unmasked: The Top 10 Fax Essential Questions Answered
sponsored by J2 Cloud Services
WHITE PAPER: In this online resource, find the answers for the top 10 questions to asked during eFax Corporate Webinar series over the past year.
Posted: 12 Sep 2017 | Published: 20 Jun 2017

J2 Cloud Services

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

The Total Economic Impact of Security-as-a-Service: Alert Logic
sponsored by Alert Logic
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Alert Logic services for cloud security.
Posted: 11 Sep 2017 | Published: 31 Jul 2017

Alert Logic

3 Reasons Manufacturers Need to Upgrade to Cloud Faxing
sponsored by J2 Cloud Services
WHITE PAPER: Read this white paper to discover how your company can upgrade to a cloud faxing platform to give your manufacturing operation a competitive advantage.
Posted: 11 Sep 2017 | Published: 24 Jul 2017

J2 Cloud Services

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

2017 Threat Landscape Report
sponsored by Fortinet, Inc.
WHITE PAPER: Review what we've learned from the threats and exploitations attacking systems and networks across the globe in 2017 as a means for gaining critical insights into how you can better prepare your network for the cyber attacks of the future.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

Budgets and Outlook: Top Vendor Providers for Cloud Information Security
sponsored by Alert Logic
RESEARCH CONTENT: This 451 Research report focuses on enterprise information security providers and top considerations among 500 leading organizations.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

Trust Must Be the Foundation of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: Successful management of your digital business and ecosystems is not founded on technology, but trust. This 19 page Forrester report explores the fundamental role that trust plays in your digital transformation, focusing on the role of trust in the business-to-business context.
Posted: 11 Sep 2017 | Published: 29 Mar 2017

IBM

Security Investigations: The Importance of Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Pervasive Encryption: A New Paradigm for Protection
sponsored by IBM
RESOURCE: The increasing integration between cyberspace and the physical world has exponentially expanded the opportunities for theft, damage, and corruption. Take a look at this report to discover trend and risk information through a security examination of different organizations.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

IBM

CW Europe – September-November 2017
sponsored by ComputerWeekly.com
EZINE: In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

ComputerWeekly.com

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

Getting Ready for the EU General Data Protection Regulation
sponsored by Ivanti
WEBCAST: The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.
Posted: 07 Sep 2017 | Premiered: Sep 13, 2017

Ivanti

Managing External Identities
sponsored by Simeio
WEBCAST: Listen to this webinar to uncover approaches to enhance your IAM security as well as customer experience.
Posted: 07 Sep 2017 | Premiered: Sep 5, 2017

Simeio

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

Cybersecurity 101: The Fundamentals of Today's Threat Landscape
sponsored by Kaspersky Lab
EBOOK: In this e-book explore the growing trend of ransomware attacks and prevention tips for enhancing cybersecurity with automation techniques.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

Understanding your Full Public Key Infrastructure (PKI) Potential
sponsored by DigiCert
EGUIDE: This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.
Posted: 06 Sep 2017 | Published: 31 Aug 2017

DigiCert

Owner-controlled PKI: The Next Step in Securing IoT
sponsored by DigiCert
EGUIDE: Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

DigiCert
151 - 175 of 3396 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement