IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
201 - 225 of 3611 Matches Previous Page  |  Next Page
Endpoint Protection
sponsored by Symantec
WHITE PAPER: As the threat environment evolves quickly and becomes more complex, organizations are struggling to keep up. Check out this white paper to learn more about the essential capabilities for boosting endpoint security.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Symantec

Code Red: You've Been Infected
sponsored by Codero
EBOOK: WannaCry ransomware targets Microsoft Windows operating systems. Check out this e-book to uncover steps you can take to mitigate WannaCry damage.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Codero

5 Cyberthreats Healthcare IT Pros Must Tackle
sponsored by Mimecast
WHITE PAPER: Defending your data against cyberthreats requires a multilayer defense. Check out this white paper to uncover the 5 critical cyberthreats of which IT healthcare professionals should be aware.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

Investigate attacks like never before
sponsored by Cisco Umbrella
RESOURCE: Dive into this interactive resource and learn about a truly innovative approach to security that allows you to drastically cut down on the noise from alerts. Access now and see for yourself how this system delivers an intuitive, single source of security intelligence that can allow you to investigate and eliminate the most critical threats.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Cisco Umbrella

Use AWS to Secure Your DevOps Pipeline Like a Bank
sponsored by Stelligent
VIDEO: From security of the source code used to trigger builds, to the insertion of strict business controls at run time, and out to the continuous inspection of the running infrastructure to ensure compliance, this webcast teaches you how to build capabilities that are enabling them to run their business faster and safer on AWS.
Posted: 21 Aug 2017 | Premiered: 29 Nov 2016

Stelligent

Office 365 Risk Mitigation
sponsored by Mimecast
WHITE PAPER: Read this white paper to discover suggestions to enhance the security of your Office 365. With the suggestions provided, determine which security tactics will improve your security posture.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

Protecting Data in the Healthcare Industry
sponsored by Mimecast
RESEARCH CONTENT: The large amount of personal information held by healthcare providers and hospitals make them ideal targets for cyberattack (especially from rogue employees). Read on to learn the history of compliance regulations, how current IT trends have increased risks (such as data theft), and what can be done to prevent data theft, fraud and more.
Posted: 21 Aug 2017 | Published: 31 Jul 2017

Mimecast

Continuous Security on AWS
sponsored by Stelligent
VIDEO: If you are planning to deploy resources with AWS, or if you have already started and are looking to improve the security of your DevOps environments on AWS, then watch this webinar. You will learn how to infuse security validation in your development and deployment processes for continuous security on AWS.
Posted: 21 Aug 2017 | Premiered: 08 Aug 2017

Stelligent

Surviving the IT Security Skills Shortage
sponsored by Arctic Wolf Networks, Inc.
EBOOK: 82% of organizations want to keep their security staff at the same level or increase it. At the same time, there is a shortage of cybersecurity people. Access this e-book examines the struggles in recruiting and retaining security professionals with the necessary types and levels of skills.
Posted: 21 Aug 2017 | Published: 31 May 2017

Arctic Wolf Networks, Inc.

3 Considerations for File Quarantine Configuration
sponsored by OPSWAT inc
WHITE PAPER: When malware is suspected in digital files, quarantining them instead of removing them is essential. Read this white paper to determine security advantages from implementing a quarantine platform for your digital documents.
Posted: 21 Aug 2017 | Published: 31 Dec 2015


Security Tech: Out with the Old in with the New
sponsored by Citrix
RESOURCE: Hackers love your outdated security tech. This new security infographic explores what's holding businesses back and what they need to do about it.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Citrix

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
RESOURCE: Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. See why customers around the globe rely on Citrix to help them address the growing cybersecurity threats of today while preparing for future requirements.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Citrix

Ransomware is Increasing: The Risks & Impact to Organizations
sponsored by Mimecast
RESEARCH CONTENT: Organizations need strong email security services that are able to identify ransomware and prevent it from infecting business computers. Read this report to discover tactics organizations can use to educate their employees on ransomware protection.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

Report: The Quarterly Threat
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: Check out this report compiled by Proofpoint, Inc. to uncover sophisticated threats across email, the web, social media, and mobile.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Proofpoint, Inc.

High-growth Best Practices Guide
sponsored by Spectrum Enterprise
WHITE PAPER: What does high growth mean to you? Ultimately, you will need high-performance network connectivity and a future-proof technology strategy. This guide explores the steps to building a foundation for sustainable growth and strategies for planning for new technologies.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Spectrum Enterprise

SafeNet Authentication Service: Affordable, flexible, cloud-based authentication
sponsored by Gemalto
WHITE PAPER: When evaluating authentication tools, the choice is not just about security: deployment, management, and cost considerations are important factors as well. Read this white paper to discover how cloud-based authentication can provide protection while saving you money.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Gemalto

Shattering the Single Pane of Glass Management Model
sponsored by JAMF
RESOURCE: 82% of organizations use two or more enterprise mobility management solutions. There is no one-size-fits-all approach to device and OS management. Download this infographic to discover how you could benefit from managing by ecosystem, instead of a single pane of glass management model.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec

macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

How the Williams Martini Racing Team Protects its Data
sponsored by Symantec
CASE STUDY: Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016

Symantec

Advanced Email Security
sponsored by Proofpoint, Inc.
RESOURCE: Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

Connect With Confidence: Three Steps to Stopping Advanced Email Threats
sponsored by Proofpoint, Inc.
RESOURCE: Your brand may be at risk. Ransomware, business email compromise, and credential phishing may be bypassing your security defenses. Check out this infographic to protect your organization from cyberattacks with 3 steps to fight back.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing
sponsored by Proofpoint, Inc.
RESOURCE: Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.
Posted: 18 Aug 2017 | Published: 31 May 2017

Proofpoint, Inc.

Computer Weekly – 22 August 2017: How banking technology has changed since the crash
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now.
Posted: 18 Aug 2017 | Published: 22 Aug 2017

ComputerWeekly.com

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: Why stress over the GDPR deadline? Check out this resource to discover a to-do list to ensure you are prepared.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Citrix
201 - 225 of 3611 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement