IT Management  >   Systems Operations  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
26 - 50 of 3147 Matches Previous Page  |  Next Page
Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016


Enterprise Apps OWASP Mobile Security Risks Report
sponsored by Wandera
WHITE PAPER: This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps.
Posted: 18 Oct 2016 | Published: 31 May 2016


Masergy's Unified Enterprise Security Solution
sponsored by MASERGY
WHITE PAPER: This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


Forrester Report on The Total Economic Impact of Agari Customer Protect
sponsored by Agari
RESEARCH CONTENT: This Forrester research content explores how 4 enterprises were able to stop phishing attacks by establishing an authentication loop to ensure only verified emails reached consumers. Learn how they were able to lower the cost of cybersecurity insurance, reduce the need for customer support, and increase customer engagement by 10%.
Posted: 18 Oct 2016 | Published: 31 Jul 2016


Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


CW Middle East Oct to Dec 2016
sponsored by
EZINE: In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.
Posted: 17 Oct 2016 | Published: 20 Oct 2016

When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016


The Incident Response Makeover Guide
sponsored by Exabeam
WHITE PAPER: Learn how to make over stalled-out incident response programs with SOC automation, utilize advanced behavior analytics, and amplify the power of your security analysts in order to reap the benefits of boosted ROI, data loss prevention, and lightning-fast incident response.
Posted: 17 Oct 2016 | Published: 17 Oct 2016


Database Audit and Protection Tips
sponsored by Imperva
EBOOK: Data auditing for security and compliance is a critical component in a data-centric security strategy. Discover an actionable set of tips for organizations looking to implement a data-centric security strategy that addresses data audit and protection. Get tangible data security benefits while simplifying the compliance audit process.
Posted: 17 Oct 2016 | Published: 30 Sep 2016


Unify Security Intelligence to Create a Strong Threat Detection and Prevention Ecosystem
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper by Dr. G.W. Ray Davidson, discover how you can unify your security intelligence processes through automation and integration. Learn how you can develop a classification scheme to determine what data is most important to protect, expand this risk scoring to all areas of your enterprise, and more.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

LogRhythm, Inc.

The Biggest Cyber Threat Facing Businesses Today
sponsored by Agari
WHITE PAPER: Business email compromise (BEC) scams are by no means a new phenomenon. But as these scams become more sophisticated, it becomes even more important to stay up to date with the latest types of attacks to evolve out of BEC. Discover a proactive approach to risk management that will help protect your business against these advanced phishing attacks.
Posted: 14 Oct 2016 | Published: 14 Oct 2016


DDoS Attacks Are On The Rise – And Fatal to Most Businesses
sponsored by Arbor Networks
EGUIDE: This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.
Posted: 13 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

Case Study: Technology Manufacturer Stops TeslaCrypt Attack
sponsored by Carbon Black
CASE STUDY: Download this case study to learn how to unravel, remediate, and moreover protect against all endpoint attacks (such as TeslaCrypt ransomware). Implement complete endpoint visibility with a proactive response platform that can reduce your number of breaches to zero.
Posted: 13 Oct 2016 | Published: 13 Oct 2016

Carbon Black

Having Trouble Sharing Content Externally?
sponsored by IntraLinks, Inc
MICROSITE: While most companies are fixing their security breaches and data leaks, they aren't addressing the security gaps that come from external content sharing. Access this blog to learn how to ensure secure collaboration between internal and external partners, and make sure that your security efforts don't go to waste.
Posted: 13 Oct 2016 | Published: 23 Jun 2016

IntraLinks, Inc

IoT Security Testing: Cover All Your Bases
sponsored by Synopsys
EGUIDE: Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
Posted: 12 Oct 2016 | Published: 11 Oct 2016

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

The Current and Future States of Cybersecurity in the Digital Economy: Part 3
sponsored by Unisys
WHITE PAPER: In the 3rd and final part of this report: explore security and privacy considerations of IoT, consider public awareness and education as strategies for enhancing readiness and security, and learn about the latest trends in cybersecurity.
Posted: 12 Oct 2016 | Published: 16 Sep 2016


The Current and Future States of Cybersecurity in the Digital Economy: Part 2
sponsored by Unisys
WHITE PAPER: In part 2 of this 3-part cybersecurity report you will uncover the current trends, the progress made and future challenges of cybersecurity research development, federal IT governance, IAM and more.
Posted: 12 Oct 2016 | Published: 16 Sep 2016


Ask The Analyst: Key Elements of an Effective Security Program
sponsored by AlienVault
WEBCAST: In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.
Posted: 12 Oct 2016 | Premiered: Jun 28, 2016


Cloud App and Service Adoption: 11 Key Steps IT Should Take
sponsored by Symantec + Blue Coat
WHITE PAPER: You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Symantec + Blue Coat

It's 2016— Do You Know Where Your Content and Data Is?
sponsored by IntraLinks, Inc
MICROSITE: Do you know where your content goes once it leaves the company? Who can access it? There's been so much focus on accessing content faster and from further away, but we've lost track of security. Access this blog to learn about data sovereignty and how to track your data no matter where it goes.
Posted: 11 Oct 2016 | Published: 28 Jul 2016

IntraLinks, Inc

The Current and Future States of Cybersecurity in the Digital Economy: Part 1
sponsored by Unisys
WHITE PAPER: In part 1 of this 3-part cybersecurity report, explore the vulnerabilities in ICS systems, as well as methods for assessing risk in your ICS cybersecurity plan – helping you combat costly and damaging attacks to critical ICS systems.
Posted: 11 Oct 2016 | Published: 16 Sep 2016


The Anatomy of DDoS Attacks And Best Practices for Preventing Them
sponsored by Arbor Networks
EGUIDE: This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

Application Development Security Requires Forethought
sponsored by Synopsys
EGUIDE: In this e-guide learn not only how to stay ahead of the competition with a quick development cycle, but also how to ensure the final product stays safe and sound.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

Authentication Best Practices: On and Off the Cloud
sponsored by HID
EGUIDE: Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

26 - 50 of 3147 Matches Previous Page    1 2 3 4 5    Next Page
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement