IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
176 - 200 of 2994 Matches Previous Page  |  Next Page
The Economics of Enterprise Data Protection on Cost and Scalability
sponsored by Sempre Technologies Ltd
EGUIDE: In this e-guide, experts reveal top tips for rising organizations' data protection needs. Uncover cost and scalability considerations for your data protection purchasing phase, as well as the economic impact of data protection in the enterprise.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Sempre Technologies Ltd

7 Things You Need to Know about Virtual Mobile Infrastructure
sponsored by Sierraware
WHITE PAPER: Trends like BYOD have forced IT departments tochange the way that they manage and secure endpoints. IT must rethink the way that they monitor andprotect business data, while still allowing users toaccess vital business applications. Access this white paper to learn seven keys to managing BYOD with virtual mobile infrastructure.
Posted: 06 Apr 2016 | Published: 23 Mar 2016

Sierraware

Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

Big Monitoring Fabric 5.5
sponsored by Big Switch Networks
DATA SHEET: Network security and traffic monitoring are highly important to business. Review this data sheet to see the benefits this product can provide for your business's network.
Posted: 05 Apr 2016 | Published: 27 Jan 2016

Big Switch Networks

Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work
sponsored by Sierraware
WHITE PAPER: As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.
Posted: 05 Apr 2016 | Published: 30 Mar 2016

Sierraware

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow

Computer Weekly – 5 April 2016: Seven steps to digital leadership
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.
Posted: 04 Apr 2016 | Published: 05 Apr 2016

ComputerWeekly.com

Secure Voting
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

ComputerWeekly.com

Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at cloud data loss prevention, the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchSecurity.com

Electronic Privacy Screens: Protect Your Data at the Source
sponsored by OptioLabs
WHITE PAPER: This white paper discusses how display security and breach detection solutions can protect against disclosures of information caused by over-the-shoulder observation and unattended workstations. Read on to discover the key features that you need to look for in a display security solution.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

OptioLabs

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Overcoming Data Sovereignty and Security Challenges with the Cloud
sponsored by PEER 1
WHITE PAPER: Access this valuable resource now and learn how to stay ahead of data residency laws, ensure you are storing data correctly, and safeguard your customer's data and ensure that its sovereignty remains intact.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

PEER 1

Top 5 IoT Security Questions for Manufacturers
sponsored by Microsoft
WHITE PAPER: The Internet of Things has introduced new security issues for manufacturers. This infographic reveals the top 5 essential questions you need to address in order to protect your connected devices and assets. Learn how to safely connect systems, devices, and other assets, as well as 4 other critical answers.
Posted: 31 Mar 2016 | Published: 31 Mar 2016

Microsoft

Overcome Security And Identity Management Challenges In Enterprise Mobility With The Right IT Infrastructure
sponsored by Microsoft
WHITE PAPER: Mobility is becoming an increasingly crucial tool in today's business landscape. Access this white paper to uncover the three key findings about risk management, security, and infrastructure that Forrester Research discovered during a study on enterprise mobility.
Posted: 31 Mar 2016 | Published: 30 Dec 2014

Microsoft

Healthcare Organization Uses IaaS, DRaaS, and DaaS Platforms for Contractor Desktops
sponsored by Cirrity
CASE STUDY: This case study reveals how one healthcare organization used a secure cloud service, with IaaS, DRaaS, and DaaS platforms, to support a virtual desktop environment to enable anytime, anywhere, access to systems for contractors all over the world.
Posted: 31 Mar 2016 | Published: 31 Mar 2016

Cirrity

Wake Up From Device Management Nightmares with User-Centric Approach
sponsored by MicroFocus
PRODUCT OVERVIEW: In this white paper, find out how managing devices by the user, instead of the device itself, gives users anytime, anywhere access, no matter what device they use, while giving IT automated management that eases time-consuming tasks. Access now to learn how you can simplify managing all the devices in your organization.
Posted: 30 Mar 2016 | Published: 31 Aug 2015

MicroFocus

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn the results of an independent test of the Check Point 13500 Next Generation Threat Prevention Appliance with Threat Emulation Cloud Service R77.20.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Solving the Growing Complexities of Network Management: Network as a Service
sponsored by Rogers Communications, Inc.
WHITE PAPER: IT teams continue to struggle to keep up with new technologies and increasing bandwidth demands are only worsening the problem. Discover how to shift your IT departments focus from day-to-day maintenance toward productivity with Network as a Service.
Posted: 30 Mar 2016 | Published: 23 Mar 2016

Rogers Communications, Inc.

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Be More Secure With Micro-Segmentation
sponsored by VMware
WHITE PAPER: This short infographic specifically identifies one way that you can improve security within the confines of your data center. Explore how using micro-segmentation can help create partitions that will prevent attackers from rampaging through your data center.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

VMware

Stop Data Center Attacks Before They Happen
sponsored by VMware
WHITE PAPER: This short infographic discusses several strategies you can deploy to create better security in the interior bounds of your data center.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

VMware
176 - 200 of 2994 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement