IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
201 - 225 of 3266 Matches Previous Page  |  Next Page
Your Guide to Securing Office 365
sponsored by MobileIron
WHITE PAPER: Learn how to employ a security model focused on mobile device deployment of Office 365. Discover how to distribute apps securely, protect app data-at-rest on the device, protect app data-in-motion to back-end services, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MobileIron

Infographic: Mitigating the Impact of Critical IT Events
sponsored by Splunk Services UK Ltd
WHITE PAPER: Discover facts and figures regarding critical IT events (CIE) in this infographic. You'll learn the economic impact of CIE's, how they're negatively effecting organizations and learn mitigation techniques to reduce the damage caused by CIE's.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Splunk Services UK Ltd

Mitigating the Impact of Critical IT Events
sponsored by Splunk Services UK Ltd
WHITE PAPER: In this Quocirca research report, discover how to create effective operational intelligence within your organization to improve coordination between security team members and deal with critical IT events (CIEs) faster.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Splunk Services UK Ltd

Resellers reach for the cloud
sponsored by MicroScope
EZINE: This themed issue looks at the opportunities for the channel in helping customers make the transition to the cloud
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MicroScope

Endpoint Security: The Latest Threat Protection Techniques
sponsored by TrendMicro
VIDEO: Discover how to protect against insider threats, ransomware, zero-day and other threats using cross-generational threat protection techniques. You'll be able to keep your end users fully protected without sacrificing speed.
Posted: 04 Nov 2016 | Premiered: 18 Oct 2016

TrendMicro

3 Steps to Get Started with Web Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to make application security (AppSec) manageable. Discover three easy steps to help you get started on your new AppSec strategy.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Cracking the Code on Application Security Success
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: This step-by-step guide will help you implement an advanced application security program for your organization. Be ahead of the curve by knowing the answer to these questions before meeting with high ranking decision makers.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

5 Steps to Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn 5 steps to properly plan your firewall, and customize it to not only meet your enterprise's personal needs, but also tackle today's myriad of virtual threats. Gain insight into deploying a next-gen, granulated firewall and a security policy that supports it.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Juniper Networks, Inc.

Protecting the Hybrid Data Center in an Increasingly Virtualized World
sponsored by Juniper Networks, Inc.
WHITE PAPER: Virtualized server workloads have increased in the past year, however most security measures in place today are for purely physical environments. Uncover how to secure your organization's current or future virtualized environments and prevent harmful security tactics.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Juniper Networks, Inc.

Fortinet’s Data Center Solution
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about fast-growing trends and gain new perspective on established trends that are affecting your data center security right now. Gain solid insight into how mobility and BYOD requires faster speeds but risks unauthorized access, server virtualization is becoming the norm but carries risks, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

Addressing Your Cloud Security Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Ease your move to the cloud with the advice offered in this white paper, including an overview of the main classes of cloud architecture, the security consideration of moving to the cloud, key challenges of public and private clouds, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

On-Demand Cloud Security for Microsoft Azure
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the long and the short of on-demand cloud security for Microsoft Azure, BYOL models, single-pane-of-glass cloud orchestration, and more. Gain knowledge of how to keep your organization safe in today's threat landscape.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Fortinet, Inc.

Infographic: Application-Layer Breaches Persist
sponsored by Veracode, Inc.
WHITE PAPER: See four major examples of application-layer data breaches and the damage they caused. Discover how and why they happened so you can better secure your application software for the future.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

QRadar Security Intelligence Client Study
sponsored by IBM
RESEARCH CONTENT: This QRadar Security Intelligence Study, presented by Ponemon Institute, surveyed 196 US IT and IT security practitioners that use QRadar Security Intelligence to monitor and defend their company's network. Learn about QRadar's operational costs, how it is deployed at a variety of different companies and its advantages by accessing now.
Posted: 03 Nov 2016 | Published: 15 Jul 2015

IBM

Global Banking Giant Streamlines and Strengthens Cybersecurity
sponsored by Dell SecureWorks
CASE STUDY: In this case study, learn how a European bank secured hundreds of locations worldwide and over 13,500 endpoints. All this while dropping their average of 70 billion security events monthly to 20-40 that needed attention and enhancing their regulatory compliance worldwide.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Dell SecureWorks

Automatically Scale Cloud Security with Ease on Amazon Web Services
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to protect your physical, virtual, and cloud workloads across your entire network.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Fortinet, Inc.

Advanced Security at Scale in the Public Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this thorough guide to the cloud, learn how to properly scale security in the public cloud, secure workloads in AWS, comply with the AWS shared-responsibility security model, and more.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Fortinet, Inc.

Cloud Security Playbook: Strategies & Best Practices for Today's Volatile Threat Landscape
sponsored by ThreatStack
WHITE PAPER: Learn strategies, best practices, and expert advice to help your company thrive amidst today's volatile cloud threat landscape.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

ThreatStack

3 Types of Insider Threats to Watch Out For
sponsored by Absolute
WHITE PAPER: Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Absolute

2016 State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Blue Coat Systems

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM

Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities
sponsored by IBM
WHITE PAPER: Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.
Posted: 02 Nov 2016 | Published: 01 Apr 2016

IBM
201 - 225 of 3266 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement