IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
226 - 250 of 3048 Matches Previous Page  |  Next Page
What mobile policy suits your organisation?
sponsored by IBM MaaS360
WEBCAST: Bring your own device (BYOD) may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

Case Study: How Brussels Airport Upgrades to a Multi-OS BYOD Solution
sponsored by MobileIron
WHITE PAPER: Read this case study to learn about how Brussels Airport was able to implement a multi-OS BYOD solution to serve everyone that passes through.
Posted: 31 May 2016 | Published: 25 May 2016

MobileIron

Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

Total Enterprise Mobility
sponsored by IBM MaaS360
WEBCAST: A strong enterprise mobility management (EMM) strategy is the key to success. Learn about the approaches necessary to planning the best EMM strategy for your organization and a solution that implements your plans to meet your needs.
Posted: 31 May 2016 | Premiered: Mar 23, 2016

IBM MaaS360

The Hunt for Data Analytics: Is Your SIEM on the Endangered List?
sponsored by Exabeam
EGUIDE: Some companies are pursuing data analytics as a complete security strategy, but many more are taking a hybrid approach. Learn how you can – and why you should – add more data analysis to your SIEM tools in order to reinforce your security defenses.
Posted: 31 May 2016 | Published: 20 May 2016

Exabeam

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

3 Reasons to Move to a Managed Security Service Provider
sponsored by MASERGY
MICROSITE: The cyberthreat landscape is growing with every technological advance. Learn how managed security service providers (MSSPs) can help bring the manpower to your constrained IT department by bringing new innovative services and approaches.
Posted: 27 May 2016 | Published: 17 Jun 2015

MASERGY

Five Reasons to Adopt an MSSP
sponsored by MASERGY
WHITE PAPER: Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.
Posted: 27 May 2016 | Published: 11 May 2016

MASERGY

Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

The Top Ten Things CIOs Ask About Enterprise Mobility
sponsored by MobileIron
WHITE PAPER: Looking to develop and strong mobile strategy? With consumer choice now the driving force behind mobile enterprise decisions, CIOs must be prepared. Here are the top 10 questions CIOs commonly ask about enterprise mobility.
Posted: 26 May 2016 | Published: 26 May 2016

MobileIron

Liquidware Labs Solutions for Windows Desktop Migrations
sponsored by Liquidware Labs
WHITE PAPER: Learn how you can simplify the migration of large deployments of physical Windows desktops environments. Discover how you can facilitate migrations in the background without affecting user productivity.
Posted: 26 May 2016 | Published: 14 Mar 2016

Liquidware Labs

Cloud Security Requires Shared Responsibility Model
sponsored by CloudPassage
EGUIDE: When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.
Posted: 25 May 2016 | Published: 17 May 2016

CloudPassage

CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Move Your Email to the Cloud with Confidence
sponsored by Mimecast
WHITE PAPER: As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.
Posted: 24 May 2016 | Published: 24 May 2016

Mimecast

IBM Data Protection for Virtual Environments
sponsored by IBM
WHITE PAPER: Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.
Posted: 24 May 2016 | Published: 31 Jul 2015

IBM

Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment
sponsored by Amazon Web Services
WHITE PAPER: Discover cloud security myths and a framework for assessing risk while comparing existing complex data center environments with new architectures in the cloud. You'll also learn three factors that contribute to cloud risk and security decisions.
Posted: 23 May 2016 | Published: 31 Jul 2015

Amazon Web Services

Drive Informed Decisions with BI Dashboards
sponsored by Pyramid Analytics
RESOURCE: Discover a business intelligence platform that can enable flexibility and speed without sacrificing security or control. Learn about easily conducting complex analyses, generating rich visualizations, and scaling to match increased user needs.
Posted: 23 May 2016 | Published: 23 May 2016

Pyramid Analytics

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Breaking Down the Benefits of Desktop Transformation
sponsored by VMware
WHITE PAPER: The future of mobility relies on the technology that it replaced; desktop computing. Desktop computing is undergoing a transformation that will couple it with the advances mobility has to offer. Read on to learn about the benefits this next-gen desktop is promising to deliver.
Posted: 20 May 2016 | Published: 29 Dec 2015

VMware

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: To combat the rising complexity of desktop environments, you need to think about implementing hybrid consumption models. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Transforming the Desktop to Align with Today’s Mobile Reality
sponsored by VMware
WHITE PAPER: With the proliferation of mobile devices, have you stopped using your desktop? Does it seem outdated? The desktop is finally undergoing a next-generation transformation. Read on to learn about what the future of desktop computing will look like as it aligns with mobility.
Posted: 19 May 2016 | Published: 31 Jul 2015

VMware

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

Middle East IT Priorities Report 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Computer Weekly’s in-depth study of IT spending priorities in the Middle East will help you benchmark your business spending in areas such as networking, datacentres and security.
Posted: 19 May 2016 | Published: 19 May 2016

ComputerWeekly.com
226 - 250 of 3048 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement