IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
176 - 200 of 2805 Matches Previous Page  |  Next Page
Tenable's Continuous Network Monitoring and the Verizon DBIR
sponsored by Tenable Network Security
WHITE PAPER: This paper discusses how you can use Verizon's Data Breach Investigation Report and apply its findings easily to your own organization.
Posted: 29 Dec 2015 | Published: 29 Jun 2015

Tenable Network Security

SecurityCenter Continuous View and the Australian Signals Directorate's Strategies to Mitigate Targeted Cyber Intrusions
sponsored by Tenable Network Security
WHITE PAPER: This resource demonstrates how one product can enhance your endeavors to make government recommended changes to your networks in the name of security.
Posted: 29 Dec 2015 | Published: 03 Sep 2014

Tenable Network Security

Cybersecurity Predictions for 2016: Targeting the Human Factor
sponsored by Proofpoint, Inc.
WHITE PAPER: This article provides deep insights into how advanced cybercriminals will improve their social engineering tactics in the future. Take a look to prepare for the evolving threats of 2016.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

Proofpoint, Inc.

Managing Business Risk with Assurance Report Cards
sponsored by Tenable Network Security
WHITE PAPER: This whitepaper explains how you can implement a security product that provides assurance Report Cards and enables security leaders to continuously demonstrate security availability.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Tenable Network Security

How Risky Mobile Apps Steal Data and Spy on Users
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores the dangers of malicious mobile apps and gives you advice on avoiding them. Discover what threats are lurking in your users' app stores and how you can keep those threats out of your network.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Proofpoint, Inc.

The State of Security in Control Systems Today
sponsored by Tenable Network Security
WHITE PAPER: This report focuses on helping ICS professionals identify the challenges facing their peers and their own enterprises.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Threat Monitoring in Tough Times
sponsored by SearchSecurity.com
EBOOK: Threat monitoring today is tough. The bad guys move fast and hide well. Learn the latest tactics for keeping systems safe.
Posted: 23 Dec 2015 | Published: 15 Dec 2015

SearchSecurity.com

Creating a Security Program That Exceeds Any Compliance Standard
sponsored by Tenable Network Security
WHITE PAPER: This resource describes the PCI DSS, the standard technical and operational requirements to protect cardholder data.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

PCI DSS Practical Guidelines for Compliance
sponsored by Tenable Network Security
RESOURCE: This resource looks at how retail enterprises can do better at thinking about and actualizing their security.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM

Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Increase Vulnerability Management Effectiveness While Reducing Cost
sponsored by Tenable Network Security
CASE STUDY: This case study discusses how one healthcare services firm upgraded their vulnerability management process by closing the gaps in their security while building up enhanced reporting.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

Tenable Network Security

Case Study: Government Institution Gains Deeper Security Insight
sponsored by ThreatConnect
WHITE PAPER: In this case study, discover how a government institution obtained greater insight into security threats by implementing predictive defenses, threat intelligence, and more.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

ThreatConnect

VoIP: Real Deployment Stories from the Field
sponsored by 8x8, Inc.
WEBCAST: This webcast features a seasoned VoIP veteran with real-world experience from thousands of successful deployments, detailing how VoIP-based technology has changed, where it is going, and where it might take companies like yours tomorrow.
Posted: 21 Dec 2015 | Premiered: May 22, 2015

8x8, Inc.

Financial Institution Uses BoKs to Centralize Access Controls Across 50,000 Servers
sponsored by FoxT
CASE STUDY: In this case study, you will learn how to centralize and automate the user account administration across your servers, enabling you to allocate fewer resources to security administration and control access. Access this study to address key regulatory compliance mandates.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

The Essential Guide to Privileged Access Management
sponsored by FoxT
WHITE PAPER: In this white paper, you will discover how to effectively and efficiently control privileged UNIX and Linux accounts using centralized access management. Read on to secure privileged access across your corporation with granular authorization, and more.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

How to Restore Trust in Your Bank’s Email Channel
sponsored by Easy Solutions
WHITE PAPER: Access this white paper to learn how financial institutions can easily take advantage of DMARC to regain confidence in their email security.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Easy Solutions

Community Collaboration Enables Threat Detection
sponsored by ThreatConnect
WHITE PAPER: This case study describes a collaborative threat intelligence initiative undertaken by five separate organizations. Read on to discover how this collaborative intelligence group kept each other safe.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ThreatConnect

Defending Your Office 365 Data: Five Threats That Microsoft Can't Defend Against, But You Can
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses where Office3 365's built-in security capabilities fall short and how you can shore up your defenses. Gain the knowledge you need to stay secure while taking advantage of all Office 365 has to offer.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Datto, Inc.

Case Study: Ad Agency Makes Office 365 Secure
sponsored by BitGlass
WHITE PAPER: This case study discusses how a global ad agency found a solution to its Office 365 security concerns. Take a look to see what security measures this organization implemented and how you can do the same.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

The Frightening Fraud Landscape of 2016: Predictions from the Experts
sponsored by Easy Solutions
WHITE PAPER: This blog post gives you a quick breakdown of the kinds of cyber-fraud you need to look out for in 2016. Read on for an essential look into the future of online fraud.
Posted: 17 Dec 2015 | Published: 26 Nov 2015

Easy Solutions

Resolve to Revitalize Your SIEM Security
sponsored by SearchSecurity.com
EBOOK: This expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

SearchSecurity.com

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

New Recommendations From FFIEC on Extortion Attacks
sponsored by Easy Solutions
WHITE PAPER: Recently, the Federal Financial Institutions Examinations Council (FFIEC) issued a statement warning financial institutions of the cyber-risks they face and suggesting steps for avoiding those risks. Access this article for a summary of the most important information and guidelines to come out of the FFIEC statement.
Posted: 15 Dec 2015 | Published: 17 Nov 2015

Easy Solutions
176 - 200 of 2805 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement