IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
201 - 225 of 2282 Matches Previous Page  | Next Page
Automating Security for Greater SaaS Success
sponsored by CloudPassage
WHITE PAPER: In this resource, learn how automated security tools and compliance monitoring will attract more cloud consumers with ease-of-use, scalability, and portability.
Posted: 28 Mar 2014 | Published: 01 Nov 2013

CloudPassage

Detecting Zero-Day Exploits in the Wild
sponsored by Websense
WHITE PAPER: This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security.
Posted: 28 Mar 2014 | Published: 28 Mar 2014

Websense

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This informative whitepaper takes a look current threat landscape and what you need to do to protect your organization.
Posted: 28 Mar 2014 | Published: 31 Jan 2014

IBM

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 27 Mar 2014 | Published: 31 Oct 2013

IBM

The Safe On-Ramp to Big Data
sponsored by Informatica
WHITE PAPER: This white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
Posted: 27 Mar 2014 | Published: 31 May 2013

Informatica

Presentation Transcript: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
TRANSCRIPT: In this resource, Phil Cox, consultant at SystemExperts Corporation, explains how to successfully extend your identity and access management (IAM) solution to the cloud.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

OpenIAM

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Advanced Persistent Threats: Insider Credentials at Risk
sponsored by NetIQ
WHITE PAPER: This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

NetIQ

Infosecurity Europe 2014
sponsored by ComputerWeekly.com
BROCHURE: Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today!
Posted: 27 Mar 2014 | Published: 24 Feb 2014

TOPICS:  Security
ComputerWeekly.com

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

IBM

Podcast: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
PODCAST: This podcast will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 26 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Cloud Servers: New Risk Considerations
sponsored by CloudPassage
WHITE PAPER: This white paper reveals the major risks associated with cloud servers.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

CloudPassage

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Cisco Connected World: International Mobile Security Study
sponsored by Cisco
WHITE PAPER: This brief resource highlights the top 3 mobile user expectations of network connectivity.
Posted: 26 Mar 2014 | Published: 26 Mar 2014

Cisco

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 26 Mar 2014 | Published: 31 Oct 2013

IBM

Security and Compliance in the Cloud: What You Need to Know
sponsored by Peak 10
RESOURCE: This resource provides information about a webinar covering cloud security and compliance.
Posted: 26 Mar 2014 | Published: 18 Feb 2014

Peak 10

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

The Benefits of an Integrated Approach to Security in the Cloud
sponsored by IBM
WHITE PAPER: This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

IBM

Reduce e-Commerce Fraud without Increasing Customer Friction for Payment Service Providers
sponsored by ThreatMetrix
WHITE PAPER: This guide discusses how to reduce payment fraud without damaging your existing customer relationships.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Reduce e-Commerce Fraud without Increasing Customer Friction for e-Commerce
sponsored by ThreatMetrix
WHITE PAPER: This guide discusses how to reduce e-commerce fraud without affecting your end-user experience.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

The New Windows Security: Achieving PC Lockdown without User Backlash in Five Easy Steps
sponsored by Dell and Microsoft
WHITE PAPER: Read this informative white paper and discover 5 easy steps for achieving PC security without affecting your end user experience.
Posted: 25 Mar 2014 | Published: 16 Sep 2013

Dell and Microsoft

Nine Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell and Microsoft
WHITE PAPER: This guide explores 9 simple tips for effective patch management and how these steps can greatly enhance security.
Posted: 25 Mar 2014 | Published: 28 Oct 2013

Dell and Microsoft

ENTERPRISE SERVICES BLOG: Top 10 Tips to Achieve Enterprise Mobility in Asia
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this resource to unveil 10 industry recommendations on how to capitalize on Asia's tech-savvy population and implement enterprise mobility into the workplace.
Posted: 25 Mar 2014 | Published: 18 Feb 2014

Hewlett-Packard Company

Evaluating Cloud Computing Services: Criteria to Consider
sponsored by FireHost Inc.
EGUIDE: This expert e-guide covers the extra protection you can get from a cloud service provider. It also will help you decide what to consider when choosing a cloud provider.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

FireHost Inc.
201 - 225 of 2282 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement