IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
226 - 250 of 3526 Matches Previous Page  |  Next Page
2017 Cyberattack Trends
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Check Point Software Technologies Ltd.

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

Slow & Steady Will Not Win The Cybersecurity Race
sponsored by CloudPassage
WHITE PAPER: Only 50% of respondents believe that security is capable of moving as fast as new release cycles, according to professionals interviewed at the RSA USA conference. Take a closer look at this infographic to uncover statistics about what IT professionals think about security technologies today.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

CloudPassage

Make Your Digital Transformation Strategy A Reality
sponsored by Lenovo
WHITE PAPER: Regardless of what your digital transformation (DX) strategy looks like, it should be able to meet three key objectives. Download this white paper to discover how your organisation can enable workers to be mobile and productive, streamline internal operations, and ensure seamless collaboration via an effective cloud strategy.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

Lenovo

Beginner's Guide to Ransomware Detection and Protection
sponsored by AlienVault
WHITE PAPER: Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

AlienVault

Trusted Identity:The Foundation forBusiness Transformation
sponsored by Entrust, Inc.
RESOURCE: By 2020, there will be 7.6 billion connected people and 75 billion connected devices. Discover how to securely evolve into a digital and mobile enterprise by using authentication strategies.
Posted: 27 Sep 2017 | Published: 20 Sep 2017

Entrust, Inc.

Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

CloudPassage

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place is all it takes to stave off the panic when an attack hits, and help you return to business as usual. Inside, learn 8 steps you can take to put this plan in place.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Top 10 Ways to Achieve Agile Security
sponsored by CloudPassage
RESOURCE: From the barrage of cyberattacks on enterprises to new threat vectors within networks due to the move to the cloud, CIOs and CISOs have more to consider around cybersecurity than ever before. Check out this brief albeit enlightening guide that reveals the 10 fundamental steps to help you get started on your own path to agile security nirvana.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

CloudPassage

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores the history of APIs and what makes them unique. Then, read on to learn 5 common threats facing APIs today a 3-tiered approach to securing both JSON and XML-based API endpoints, and more.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Why Security in DevOps is Essential
sponsored by TechTarget
RESOURCE: Integrating security into the DevOps process is important to meet security and compliance requirements, yet many organizations aren't sure where to start. We're here to help. In our guide, Why Security in DevOps is Essential, discover 3 steps to improve DevOps and security. Simply take our Endpoint Security Survey to access this exclusive guide.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

TOPICS:  Security
TechTarget

Cloud Secure Virtualization Datasheet
sponsored by IBM
DATA SHEET: Download this sheet to get the technical rundown on a cloud infrastructure that addresses in-house security needs with automated compliance controls and data security for virtualized cloud workloads. You'll learn how to establish virtual workload security down to the microchip level, and more.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

IBM

The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
sponsored by A10 Networks
EGUIDE: Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

How to Address Key SSL Security Issues and Vulnerabilities
sponsored by A10 Networks
EGUIDE: Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Your Business Apps are Under Attack: Are you really Protected?
sponsored by Alert Logic
VIDEO: Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Alert Logic

Expert Perspectives on Data Protection and GDPR Compliance
sponsored by CyberArk Software, Inc
EGUIDE: A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

Cloud Security Report
sponsored by Alert Logic
RESEARCH CONTENT: According to this Cloud Security report, application attacks account for 75% of verified security incidents beating out brute force attacks, DDoS and more. In this research report, explore an overview of these different types of attacks and how attackers choose their targets.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Alert Logic

Transitioning from Traditional IT to a Secure Cloud
sponsored by Alert Logic
CASE STUDY: This case study explores how Wilbur-Ellis transformed their network infrastructure and the immediate benefits received from leveraging an Amazon Web Services (AWS) cloud platform and security-as-a-service (SaaS) provider.
Posted: 22 Sep 2017 | Published: 31 Dec 2015

Alert Logic

Building the Agile Enterprise: Maintain Your Competitive Edge
sponsored by Verizon
WHITE PAPER: Enterprise leaders want a network that exceeds their customers' expectations. Explore this white paper to reveal how to collaborate better with employees and open up new business opportunities by virtualizing your network infrastructure.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon

Building the Case for Virtual Network Services
sponsored by Verizon
WHITE PAPER: As the digital economy continues to take hold, organizations need to focus on their applications, and specifically how customers access the services within the business. Read this white paper to reveal benefits you can see from using network functions virtualization.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid
226 - 250 of 3526 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement