IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
151 - 175 of 3415 Matches Previous Page  |  Next Page
Passwords Are Out: But What's Replacing Them?
sponsored by Crossmatch
PODCAST: Join experts Keven Beaver and Jeff Carpenter in this podcast as they discuss why passwords are obsolete and what the "human-proofed" future of IAM and authentication will look like.
Posted: 25 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

Guide To PCI Compliance For Containers
sponsored by Twistlock, Inc.
RESOURCE: Inside this guide learn tips for both technical and compliance teams on managing containers for credit card information. Most importantly, discover how this program can help maintain compliance for the Payment Card Industry (PCI) and Data Security Standard (DSS).
Posted: 25 Jul 2017 | Published: 24 Jul 2017


Riskiest Industries in the Cloud
sponsored by Cisco Cloudlock
WHITE PAPER: Not all risk on the cloud is created equal. Discover the riskiest industries on the cloud, case studies, common cloud cybersecurity concerns, and more.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

The Complete CASB Selection Criteria Guide
sponsored by Cisco Cloudlock
WHITE PAPER: A cybersecurity platform could be what your enterprise needs to combat today's threats. Discover how to choose and implement a CASB for your enterprise with these 7 criteria.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

5 Key Benefits of Securing Your Cloud with CASB
sponsored by Cisco Cloudlock
WHITE PAPER: Keep your cloud secure. Discover 5 key components that your CASB should have to ensure your organization's safety in the cloud.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin

Closing the Cloud Security Readiness Gap
sponsored by HyTrust
WEBCAST: Discover why security readiness lags behind adoption in the cloud and what can be done to mitigate the vulnerability and risk that creates.
Posted: 24 Jul 2017 | Premiered: Jul 24, 2017

HyTrust

SANS 2016 Survey on Security and Risk
sponsored by WhiteHat Security
WHITE PAPER: Financial service organizations are successfully attacked more than any other type of cybercrime victim. Discover how and why they are attacked, how prepared they are, and what steps are being taken to mitigate their risk.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

WhiteHat Security

The Explosion of Third-Party Apps: 27% are Risky
sponsored by Cisco Cloudlock
RESEARCH CONTENT: Of all the apps granted access to corporate systems last year, 27% of third-party apps were classified as high-risk. Learn more about the impact of Shadow IT, third-party apps, and cloud on security. Plus, uncover the top 10 risky apps and the top 10 most trusted ones.
Posted: 24 Jul 2017 | Published: 30 Jun 2016

Cisco Cloudlock

When the State of Security Makes You WannaCry
sponsored by WhiteHat Security
WHITE PAPER: WannaCry was a worm, a kind of attack that was thought to be obsolete. So why was it one of the largest and most effective cyberattacks in recent memory? Discover why so many organizations were vulnerable, and what you can do to protect your organization from future attacks.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

WhiteHat Security

Post-Password Security: AI, Risk-Based and Context
sponsored by Crossmatch
WEBCAST: Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.
Posted: 24 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

Secure Google Doc Sharing: Guardian News and Media Selects Cisco Cloudlock
sponsored by Cisco Cloudlock
CASE STUDY: Explore how the security team over at The Guardian mitigated the risk of sharing documents outside their domain and storing sensitive content in the cloud. Discover how they were able to enhance visibility into document sharing in Google Docs, control document permissions, receive exposure alerts, and more.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

Top 10 Encryption Benefits
sponsored by HyTrust
WHITE PAPER: Encryption, handled poorly, can lead to more vulnerabilities than it solves. Discover 10 benefits of properly deployed encryption.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

HyTrust

How The World'S Biggest Enterprise Networking Company Secures A Half-Million Global Endpoints.
sponsored by Cisco Umbrella
CASE STUDY: Click inside to learn how Cisco was able to effectively secure 2.5 million active IPs. See how by focus on the DNS layer, they provided this level of protection to their global workforce with room for growth.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Unified Endpoint Management for Dummies
sponsored by IBM
EBOOK: Learn about unified endpoint management (UEM) and how it helps you manage and secure the growing number of devices, apps, and data within your organization. Discover 5 core features of effective UEM, how to monitor endpoints and end-users, how to protect content and proprietary data, and more.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

IBM

The Rise Of The Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: The integration of cloud apps into the everyday business environment has made securing web access more difficult than ever. Click inside to find out how a Secure Internet Gateway (SIG), can help modern businesses secure user information across public and private cloud environments.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Passwords are Out: But What's Replacing Them?
sponsored by Crossmatch
WEBCAST: Join experts Keven Beaver and Jeff Carpenter in this webcast as they discuss why passwords are obsolete and what the "human-proofed" future of authentication will look like.
Posted: 24 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

How to Mitigate the Risk of Unpatched Vulnerabilities
sponsored by FireMon
WHITE PAPER: The most common vulnerabilities and exposures are well known, but ironically still provide attackers with the best chance to infiltrate and damage your organization. Why? Discover why patching sometimes isn't an option, and what to do to help mitigate the risk these constraints place upon your organization.
Posted: 24 Jul 2017 | Published: 08 Nov 2016

FireMon

Protect Your Enterprise From Ransomware With Intelligent Hybrid Cloud Storage
sponsored by Panzura
WHITE PAPER: As the ransomware threat grows, it's becoming increasingly obvious that traditional methods of protection aren't keeping our data safe. Read on to learn how adopting an intelligent hybrid cloud storage system could be the key to mounting a real defense against ransomware.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Panzura

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Uncover 4 steps to reduce exposure to ransomware attacks, and to minimize its impact in the event of an attack.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

How Protecting Valuable IP Helps A Leading Automotive Supplier Drive Productivity
sponsored by Cisco Umbrella
WHITE PAPER: Learn how a major automotive group was able to preemptively secure their globally distributed network against potential threats, safeguarding 2,500 users and their valuable intellectual property.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Umbrella

Creating an Organisational-Wide Culture of Security
sponsored by Dell SecureWorks
WHITE PAPER: When the winds of IT trends change, your security system needs to be able to change with them. Click inside to learn why an effective communication workflow is key to building an organization-wide culture around cybersecurity.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks

The Cloud Threat Funnel: Suspicious User Behavior That Matters
sponsored by Cisco Cloudlock
WHITE PAPER: Properly identifying suspicious activities in the cloud is akin to finding a needle in the haystack. In this cloud security report, discover what you should be looking for and how to mitigate the risk.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Cloudlock

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: GDPR is coming fast, and non-compliance can cripple businesses with heavy fines expected. Ensure your company isn't among those failing to comply. Discover how to achieve GDPR readiness and compliance by enabling IT to create a software-defined perimeter.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

Composite Authentication: Security Beyond Passwords
sponsored by Crossmatch
WEBCAST: In this webcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 21 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch
151 - 175 of 3415 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement