IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
176 - 200 of 3266 Matches Previous Page  |  Next Page
Best Practices to Securing the Cloud and SDDC
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.
Posted: 08 Nov 2016 | Premiered: Sep 30, 2016

Check Point Software Technologies Ltd.

How to Ensure Quality Content Delivery in a Mobile World
sponsored by Limelight Networks, Inc.
DATA SHEET: Delivery high quality content to screens all over the world is taxing, especially considering the plethora of devices being used to access it in today's highly mobile world. Learn what important factors media and broadcasters need to take into consideration when deciding on a content delivery platform.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Limelight Networks, Inc.

The Path Ahead for Security Leaders
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to link your identity to business value rather than limiting it to security expertise. By doing so, the security leaders of today can earn a strategic role on the executive teams of tomorrow.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Genius Project Security Guide
sponsored by Cerri.com AG
WHITE PAPER: Discover the security features you should be looking for in project management software solution. It's important for your project management software to protect your data from attacks while ensuring the availability, integrity and confidentiality.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

Cerri.com AG

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Cloud IAM Buyer's Guide: Which Vendor is Right for You?
sponsored by IBM
WHITE PAPER: Discover five simple questions you must ask of any potential Identity and Access Management as a Service (IDaaS) vendor to get a fresh look at your options. Learn how to score each vendor to easily compare their strengths and weaknesses.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

IBM

The New Generation of Network Security
sponsored by Juniper Networks, Inc.
WEBCAST: Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.
Posted: 07 Nov 2016 | Premiered: Nov 7, 2016

Juniper Networks, Inc.

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Preventing PDF Exploits with Endpoint Security
sponsored by TrendMicro
VIDEO: See how endpoint security can fail when it comes to detecting malicious documents, particularly PDFs. Uncover a side-by-side comparison of endpoint security vendors as they attempt to deal with malicious documents.
Posted: 07 Nov 2016 | Premiered: 07 Nov 2016

TrendMicro

Mitigating Security Risk from Partners, Affiliates and Suppliers
sponsored by Dell SecureWorks
WHITE PAPER: Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Effectively Manage Application Security Risk in the Cloud
sponsored by IBM
WHITE PAPER: Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

IBM

Persistence Technology and Securing Every Device
sponsored by Absolute
WHITE PAPER: Learn how your security leadership can reach out and secure lost or stolen enterprise hardware. With the capacity to remotely secure potentially vulnerable endpoints, you can finally embrace a mobile workforce without exhausting concerns about security.
Posted: 07 Nov 2016 | Published: 31 Dec 2015

Absolute

Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Modern Cybercrime: Staying Ahead of The Perfect Storm
sponsored by Trustwave
WEBCAST: Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.
Posted: 07 Nov 2016 | Premiered: Jul 20, 2016

Trustwave

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

MobileIron

Using Metrics to Manage Your Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: This SANs resource help you measure your application security (AppSec) program and ensure AppSec is part of your organization's culture moving forward.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Assessing Application Security: A Buyer’s Guide
sponsored by Veracode, Inc.
WHITE PAPER: In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Check Point Software Technologies Ltd.

Automating Advanced Security for the Software Defined Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Fortinet, Inc.

Juniper Networks Security Director
sponsored by Juniper Networks, Inc.
WEBCAST: Learn how to improve your organization's threat detection while employing intuitive firewall controls while gaining deep visibility into your network's traffic. Access now to discover how to make your enterprise's security run smoothly and more effectively than ever.
Posted: 04 Nov 2016 | Premiered: Nov 4, 2016

Juniper Networks, Inc.

Case Study: Expedient Keeps Customers' Networks Safe and Highly Available
sponsored by Juniper Networks, Inc.
CASE STUDY: Learn how an IT outsourcing company was able to offer its clients services tailored to their specific needs and accelerate service delivery across the spectrum.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Juniper Networks, Inc.

Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: Examine 6 of the most important IT security considerations in migrating to Windows 10. Discover how persistent endpoint security tools can help you address these challenges and enable your devices to stay secure beyond the operating system upgrades.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits
176 - 200 of 3266 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement