IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
201 - 225 of 3049 Matches Previous Page  |  Next Page
Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.
Posted: 07 Jun 2016 | Premiered: Jun 7, 2016

Check Point Software Technologies Ltd.

Embracing the Digital Workplace
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Organizations across all industries recognize the need to embrace digital transformation or risk being left behind in today's mobile world. Transform your business by embracing digital and discover the key trends driving the transformation as well as, the impact these trends are having on the underlying mobile networks.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

Hewlett Packard Enterprise

The Threats Facing Financial Service Institutions in 2016
sponsored by Verizon
RESOURCE: Understand the nature of the security threat facing financial enterprises in 2016. Inside this paper you will find a quick, granular discussion of the sorts of attacks your network will be facing this year, and ways to inoculate your data from harm or theft.
Posted: 06 Jun 2016 | Published: 29 Apr 2016

Verizon

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER: With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

Intermedia Builds an Instant Security Operations Center and Speeds Business Processes
sponsored by Splunk
CASE STUDY: This case study demonstrates how Intermedia overcame its cloud security challenges and boosted productivity with data-driven analytics and incisive, enterprise-wide intelligence.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Splunk

Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

IDC: Best Practice in Deploying Enterprise Mobility
sponsored by MobileIron
CASE STUDY: Explore 4 case studies that discuss a range of approaches to enterprise mobility. Access now to gain insight on the trends of enterprise mobility deployments, and how to overcome common challenges.
Posted: 03 Jun 2016 | Published: 31 Dec 2012

MobileIron

Solution at a Glance - Citrix NetScaler and Cisco Application Centric Infrastructure
sponsored by citrix and cisco
WHITE PAPER: Two major companies have come together to produce a joint solution that improves application performance and delivers agility through data center automation. Read on to gain an understanding of how your business will benefit from this solution.
Posted: 03 Jun 2016 | Published: 25 May 2016

citrix and cisco

Extending Your IT Infrastructure to the AWS Cloud
sponsored by Amazon Web Services
VIDEO: Find out how you can seamlessly and securely integrate cloud resources into your existing IT infrastructure. You'll learn how you can benefit from adopting a hybrid cloud architecture.
Posted: 02 Jun 2016 | Premiered: 13 Feb 2013

Amazon Web Services

Prevent Insider Threats with Behavioral Analytics
sponsored by Exabeam
WHITE PAPER: Not all threats exist outside your organization. Insider threats could be potentially worse if they go undetected—leaking critical information. So how do you distinguish an insider attack, and more importantly, how do you stop them? Find out in the following exclusive white paper.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Exabeam

MobileIron Named a Leader in Enterprise Mobile Management Report
sponsored by MobileIron
RESOURCE: Find out how the top 11 enterprise mobile management (EMM) vendors stack up against each other when compared against an expert 25-criteria evalutaion.
Posted: 02 Jun 2016 | Published: 04 Dec 2015

MobileIron

Sky case study
sponsored by MobileIron
CASE STUDY: One of the leading entertainment companies in Europe found that its sales staff was increasing their mobile device usage. They now needed a reliable way to manage and secure their employees devices. Read on to learn how one solution increased innovation for this industry leader.
Posted: 02 Jun 2016 | Published: 01 Jun 2016

MobileIron

Orrstown Bank Invests in Centralized Security Visibility to Promote Business Intelligence
sponsored by Splunk
CASE STUDY: Read this case study to determine how Orrstown Bank leveraged a cloud security platform to provide increased visibility into its complex hybrid IT infrastructure, resolve threats and maintain required compliance.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Splunk

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

User Behavior Analytics: Track Individual Data and Activities in Your Network
sponsored by Exabeam
EGUIDE: Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.
Posted: 01 Jun 2016 | Published: 24 May 2016

Exabeam

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Four security tips for HIPAA compliance in healthcare cloud storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

Case Study: Going Mobile Without Sacrificing Security
sponsored by MobileIron
CASE STUDY: As mobile devices become more prevalent in the workplace, ensuring security for these devices becomes a necessity. Uncover a case study about Nemours, a healthcare provider, which gave its employees secure mobility with a single solution.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

Mobile First Healthcare
sponsored by MobileIron
WHITE PAPER: It isn't news that the healthcare industry has stringent privacy regulations. Don't let these regulations hold you back from taking adavantage of all that mobility has to offer. Read on to learn about a solution that provides mobile security so healthcare professionals can do their jobs without having to worry about privacy breaches.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

Top Five CEO Wire Fraud Attacks
sponsored by Cloudmark
RESOURCE: As an attack, the CEO email wire fraud attack couldn't be simpler. There's no malware to write and no malicious code or links to implant. It's a text only email, plain and simple - but it's the social engineering that makes it work.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

Cloudmark

Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER: This white paper explores the effectiveness of real-time malware protection for financial institutions and banking customers. View now and see how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

HID

Top 10 Reasons to Optimize Data Center Infrastructure Management
sponsored by CommScope
WHITE PAPER: Access this resource to find 10 key reasons to optimize how you map out connectivity, understand usage, track equipment, and plan and monitor change in your data center.
Posted: 01 Jun 2016 | Published: 03 Nov 2015

CommScope

Mobile First Financial Services
sponsored by MobileIron
WHITE PAPER: The financial services industry has found that mobility is the big stake feature that will propel organizations forward or leave them in the dust. Read on to learn about a mobile service designed with the cost and security concerns of the finance industry in mind.
Posted: 31 May 2016 | Published: 25 May 2016

MobileIron
201 - 225 of 3049 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement