IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
176 - 200 of 3510 Matches Previous Page  |  Next Page
How Veracode Supports your Complete Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: Application layer attacks are now the most frequent pattern in confirmed breaches, according to Verizon. Every organization is dependent on applications – if these applications are at risk, so is the business. In this white paper uncover how to boost your application security effectively.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

Veracode Integrations
sponsored by Veracode, Inc.
WHITE PAPER: As more organizations move to DevOps, application security needs to keep up or risk being left behind. Access this white paper to learn how you can integrate your application security with your security and development teams' existing tools and processes.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

Prove Yourself: Identity in a Mobile-Cloud World
sponsored by VMware
EBOOK: The reality of implementing a digital workplace is that authenticating users is going to become more difficult. Access this e-book to learn how to handle identity and access management in a world that revolves around mobility and the cloud.
Posted: 03 Oct 2017 | Published: 31 Jul 2017

VMware

Cloud Security Certifications 101
sponsored by TechTarget
RESOURCE: Fill out our Network Security Survey to access our exclusive Cloud Security Certifications 101 guide. Experts Ed Tittel and Mary Kyle examine cloud security certifications, both vendor-neutral and vendor-specific, so that you can find one to demonstrate your skillset.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

TechTarget

Comprehensive Mobile-Cloud Enterprise Security
sponsored by MobileIron
WHITE PAPER: Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

How the Garrigan Lyman Group Managed Cloud Security
sponsored by Alert Logic
CASE STUDY: Learn how Garrigan Lyman Group (GLG) deployed Alert Logic technology to help prevent against network security attacks and increase customer satisfaction and trust.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Alert Logic

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: A National Institute of Standards and Technology study found that it is 6 times more costly to fix vulnerabilities in production vs. during coding. In this white paper, gain insight into how DevSecOps is the future of software development.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Veracode, Inc.

Cloud Data Management: Enabling Hybrid IT Infrastructure
sponsored by Commvault
VIDEO: Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.
Posted: 02 Oct 2017 | Premiered: 26 May 2017

Commvault

Do More with Complete Mobile-Cloud Security
sponsored by MobileIron
WHITE PAPER: This shift toward modern mobile-cloud technologies is forcing organizations to rethink everything from datacenter architectures to endpoint security because traditional, desktop-based security models are no longer adequate. Download this white paper to uncover some of the critical security gaps today's mobile-cloud enterprises must address.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

2017 Cyberattack Trends
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Check Point Software Technologies Ltd.

Igniting Innovation with Servers
sponsored by Dell EMC Intel (Xeon) ®
WHITE PAPER: Servers are the bedrock of the modern software-defined data center and the key to building a flexible, efficient and cloud-enabled infrastructure. Access this white paper to learn about a server that provides security and scalability.
Posted: 29 Sep 2017 | Published: 29 Sep 2017

Dell EMC Intel (Xeon) ®

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

Create A Simpler, Secure, more Agile Network
sponsored by Nokia
WHITE PAPER: Uncover the immediate benefits of a virtualized software-based approach that makes it easier to enable essential network security elements. These include authentication, authorization and accounting, diameter routing agents and session border controllers.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Nokia

Slow & Steady Will Not Win The Cybersecurity Race
sponsored by CloudPassage
WHITE PAPER: Only 50% of respondents believe that security is capable of moving as fast as new release cycles, according to professionals interviewed at the RSA USA conference. Take a closer look at this infographic to uncover statistics about what IT professionals think about security technologies today.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

CloudPassage

Make Your Digital Transformation Strategy A Reality
sponsored by Lenovo
WHITE PAPER: Regardless of what your digital transformation (DX) strategy looks like, it should be able to meet three key objectives. Download this white paper to discover how your organisation can enable workers to be mobile and productive, streamline internal operations, and ensure seamless collaboration via an effective cloud strategy.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

Lenovo

Beginner's Guide to Ransomware Detection and Protection
sponsored by AlienVault
WHITE PAPER: Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

AlienVault

Rethink DNS: Ways to use DNS to Optimize Performance, Build Resiliency, and Manage Traffic Across Hybrid Cloud Environments
sponsored by Oracle + Dyn
EBOOK: In this e-book, learn how to overcome the challenges of your in-house DNS infrastructure to optimize performance, reliability, and security that together help prevent outages.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

Oracle + Dyn

Trusted Identity:The Foundation forBusiness Transformation
sponsored by Entrust, Inc.
RESOURCE: By 2020, there will be 7.6 billion connected people and 75 billion connected devices. Discover how to securely evolve into a digital and mobile enterprise by using authentication strategies.
Posted: 27 Sep 2017 | Published: 20 Sep 2017

Entrust, Inc.

Understanding and Mitigating DDoS Attacks
sponsored by Oracle + Dyn
WHITE PAPER: An average DDoS attack results in about 54 minutes of downtime, which can translate to substantial revenue loss. Inside, uncover how your DNS infrastructure is susceptible to a variety of DDoS attacks and how to overcome these threats.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

Oracle + Dyn

Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

CloudPassage

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place is all it takes to stave off the panic when an attack hits, and help you return to business as usual. Inside, learn 8 steps you can take to put this plan in place.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Top 10 Ways to Achieve Agile Security
sponsored by CloudPassage
RESOURCE: From the barrage of cyberattacks on enterprises to new threat vectors within networks due to the move to the cloud, CIOs and CISOs have more to consider around cybersecurity than ever before. Check out this brief albeit enlightening guide that reveals the 10 fundamental steps to help you get started on your own path to agile security nirvana.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

CloudPassage

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores the history of APIs and what makes them unique. Then, read on to learn 5 common threats facing APIs today a 3-tiered approach to securing both JSON and XML-based API endpoints, and more.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

The 2017 Veritas GDPR Report - Think you are Ready for GDPR- Think again
sponsored by Veritas
RESOURCE: Only 2% of companies meet GDPR compliance criteria. Where are organizations going wrong? Explore this infographic to reveal statistics regarding GDPR compliance and learn GDPR requirements your organization needs to follow to ensure readiness for the deadline.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Veritas

Why Security in DevOps is Essential
sponsored by TechTarget
RESOURCE: Integrating security into the DevOps process is important to meet security and compliance requirements, yet many organizations aren't sure where to start. We're here to help. In our guide, Why Security in DevOps is Essential, discover 3 steps to improve DevOps and security. Simply take our Endpoint Security Survey to access this exclusive guide.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

TOPICS:  Security
TechTarget
176 - 200 of 3510 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement