IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
151 - 175 of 3090 Matches Previous Page  |  Next Page
Security at the DNS Layer
sponsored by OpenDNS
VIDEO: Learn about a first line of defense at the DNS layer that can protect your IT infrastructure from malware and monitor for emergent threats.
Posted: 25 Jul 2016 | Premiered: 31 May 2016

OpenDNS

Assessing the Impact of Organizational Change on Financial Systems
sponsored by Infor
WHITE PAPER: In this white paper, discover how stovepipe systems and legacy applications on life-support hamper your ability to respond to change. Find out how you can prep for organizational change by building flexibility into your cloud and analytics strategies.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Using Finance Applications for Better Process Efficiencies and Data Accuracy
sponsored by Infor
WHITE PAPER: Discover how to identify and implement best-of-breed enterprise-level finance applications that improve process efficiencies and data accuracy, which Aberdeen Research reveals is increasingly critical to success.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Technology Platforms for Business Integration
sponsored by Infor
WHITE PAPER: Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Going global: Get up and running quickly no matter where you need to go
sponsored by Infor
WHITE PAPER: Discover how making sure that key capabilities are built into your technology can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the complexities of expanding your business globally.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Tips for Streamlining Financial Processes and Providing Real Time Reporting
sponsored by Infor
WHITE PAPER: Discover how to address the growing gap between what a modern financial department should be able to and what they are actually able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Unified Security Management vs. SIEM: a Technical Comparison
sponsored by AlienVault
WHITE PAPER: Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

AlienVault

Applying Data Science to User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Discover how to reduce false positives for User and Entity Behavior Analytics (UEBA) and use machine learning to derive network context. Access this whitepaper now to learn proven techniques from real customer deployments.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Exabeam

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Take a Behavioral Bite Out of Crime
sponsored by Infor
WHITE PAPER: 44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Infor

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

SSL Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016

SearchSecurity.com

Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Businesses Should Begin Preparing for the Death of the Password
sponsored by Gigya
ANALYST REPORT: Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK: The list of internet of things challenges is not short, but security is still a top concern. Learn to cut risks and follow IoT security best practices.
Posted: 19 Jul 2016 | Published: 20 Jul 2016

SearchSecurity.com

The Benefits of Using an Appliance to Simplify and Accelerate Desktop Virtualization Initiatives
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Discover the market forces spurring the growing demand for desktop virtualization, explore the advantages an appliance has on desktop virtualization deployments, and learn what fundamentals to look for in a desktop virtualization appliance.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Dell, Inc. and IntelĀ®

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat
151 - 175 of 3090 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement