IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
176 - 200 of 3609 Matches Previous Page  |  Next Page
Overcoming Overwhelmed IT Security Teams with Amazon Web Services
sponsored by AWS-Trend Micro
EBOOK: Access this e-book to dive into the three main problem areas of cloud security: server management, the human element, and having the wrong tools for the job. You will also learn how to provide security for your AWs environment.
Posted: 24 Aug 2017 | Published: 25 Jul 2017

AWS-Trend Micro

The Cloud Evolution: Top Security Challenges & How to Overcome Them
sponsored by AWS-Trend Micro
WHITE PAPER: Leverage Deep Security on AWS to adopt a DevSecOps culture, so your IT team can spend less time focusing on security and more developing your core business applications.
Posted: 24 Aug 2017 | Published: 25 Jul 2017

AWS-Trend Micro

Outbound Gateway Protection with UTM on AWS
sponsored by AWS - Sophos
CASE STUDY: Sophos Unified Threat Management (UTM) on AWS/ Comprehensive Network Security for Your Cloud Environment
Posted: 24 Aug 2017 | Published: 19 Jul 2017

AWS - Sophos

Case Study: Groundbreaking Workforce Development Enabled by AWS
sponsored by AWS - Sophos
CASE STUDY: The Louisiana Department of Corrections (DOC) needed a secure way to provide online courses for inmates, ensuring that they stayed in the designated virtual environment. Access this case study to see how the DOC was able to launch the secure AWS environments they needed to put inmates on the path to career success.
Posted: 24 Aug 2017 | Published: 18 Jul 2017

AWS - Sophos

Endpoint 101: How Do Different Types of Antivirus Work?
sponsored by Carbon Black
WEBCAST: Take a look at this quick 101 endpoint security webcast to learn more about antivirus approaches and their strategies to enhance your endpoint security.
Posted: 24 Aug 2017 | Premiered: Aug 18, 2017

Carbon Black

What is a Non-malware Attack?
sponsored by Carbon Black
WEBCAST: Non-malware attacks leave a small footprint making them extremely hard to spot. Check out this 101 webcast to learn more about non-malware attacks and how you can protect yourself from them.
Posted: 24 Aug 2017 | Premiered: Aug 18, 2017

Carbon Black

The Essential Guide to Log Management
sponsored by Stratalux
EBOOK: Download this white paper for an overview of log management including consumers of log data, use cases, challenges and a comparison of log management solutions available in the market.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

Stratalux

Eliminating Access Blind Spots
sponsored by RSA
WHITE PAPER: 63% of data breaches involve compromised identities, according to the 2017 Verizon DBIR. Uncover how to enhance your security posture with multi-factor authentication that can mitigate potential risks prior to them causing trouble.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

6 Key Steps to Successful Identity Assurance
sponsored by RSA
WHITE PAPER: Uncover guidance on the six key elements to identity assurance and how to increase security while optimizing the end user's experience. Learn how to deliver access to users that's both convenient and secure.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

Five Pitfalls to Avoid for a Pain-Free Two-Factor Authentication Deployment
sponsored by RSA
RESEARCH CONTENT: In this Forrester Research report, examine 5 pitfalls that security pros should take care to avoid when deploying a two-factor authentication tool. For each pitfall, discover actionable recommendations that will help you ensure a smooth and seamless deployment.
Posted: 23 Aug 2017 | Published: 23 May 2016

RSA

Risk-Driven Identity And Access Management Process Framework
sponsored by RSA
WHITE PAPER: Access this Forrester Research report to learn how a risk-based IAM strategy can help you to identify threats and insecure behaviors early on, and defend against them more efficiently.
Posted: 23 Aug 2017 | Published: 06 Jan 2017

RSA

Build Your Identity and Access Management Strategy
sponsored by RSA
RESEARCH CONTENT: This Forrester Research report provides guidance for the development of a compelling and successful identity and access management strategic plan.
Posted: 23 Aug 2017 | Published: 03 Apr 2017

RSA

Mobile Application Authentication Trends and Best Practices
sponsored by RSA
RESEARCH CONTENT: Download this March 2017 Forrester Research report to learn about the various mobile application authentication methods, frameworks, tools and best practices for implementing mobile authentication at your organization.
Posted: 23 Aug 2017 | Published: 02 Mar 2017

RSA

Are You a Proxy Pro? Put Yourself to the Test
sponsored by Symantec
WHITE PAPER: ProxySG consolidates a broad feature-set to authenticate users, filter web traffic, identify cloud application usage, and provide data loss prevention and more. Check out these key capabilities you should leverage on your Blue Coat Proxy.
Posted: 23 Aug 2017 | Published: 31 Dec 2016

Symantec

Identity as a Service: Vendors Compared
sponsored by Centrify Corporation
EGUIDE: This analyst report compares different IDaaS platforms, so that you can implement the right technology for your organization's specific needs. Learn more about the current identity as a service vendors and tools.
Posted: 23 Aug 2017 | Published: 30 Jun 2017

Centrify Corporation

The 2017 DevSecOps Global Skills Survey
sponsored by Veracode, Inc.
RESEARCH CONTENT: In Veracode's 2017 DevSecOps Global Skills Survey, 400 DevOps professionals discussed their views of today's workforce. Uncover the results of the survey conducted to study working professionals' preparedness of dealing with security in the workforce.
Posted: 23 Aug 2017 | Published: 30 Jun 2017

Veracode, Inc.

Enterprise Security
sponsored by Symantec
RESOURCE: Many enterprises are putting a large amount of trust in the cloud and mobile networks. Take a look at this resource to reveal strategies you can use to secure these endpoints and your enterprise data.
Posted: 23 Aug 2017 | Published: 31 Dec 2016

Symantec

A New Dawn For Data Privacy
sponsored by Symantec
RESOURCE: At GDPR's core is the idea of privacy as a fundamental right, along with radical changes in the way organizations are required to manage data. Check out this infographic to start preparing your organization for the 2018 deadline.
Posted: 23 Aug 2017 | Published: 23 Aug 2017

Symantec

Preventing Known and Unknown Threats
sponsored by OPSWAT inc
WHITE PAPER: Preventing known and unknown threats is essential for boosting security platforms. Read this white paper to take an in-depth look at the advantages and disadvantages of single-malware products vs. the value of multi-scanning.
Posted: 22 Aug 2017 | Published: 22 Aug 2017


Why Digital Signing and Verification is Paramount in Cross Domain Environments
sponsored by OPSWAT inc
WEBCAST: Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017


App-Centric Security — Meeting the Needs of the Modern Mobile Enterprise
sponsored by Blue Cedar
WHITE PAPER: IT security executives must constantly assess the best ways to secure mobile devices. Check out this white paper to learn about strategies to increase your mobile security posture.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Blue Cedar

Protecting Data in the Healthcare Industry
sponsored by Mimecast
WHITE PAPER: The healthcare industry finds itself under cyberattack from many vectors, including ransomware, malware and targeted attacks. Read this white paper to determine strategies to secure your data.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Mimecast

Hosting: The Strategic Decision SMBs Should Take More Seriously
sponsored by Codero
WHITE PAPER: You need to invest in a hosting service to keep your SMB up and running, but which kind of service do you utilize? This white paper breaks down the process of making a hosting choice and discusses why you need to approach this as a strategic decision.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Codero

Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER: Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016

Symantec

Secure Your VDI If You Don't Wanna Cry Again
sponsored by Citrix Ready
WHITE PAPER: Virtual desktop infrastructures (VDIs) are a popular option for those looking to connect and work with their data from anywhere in the world. It would be easy enough for WannaCry to piggyback its way into your system. This upcoming webcast will teach you how to protect your virtualized environment and key best practices for doing so.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Citrix Ready
176 - 200 of 3609 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement