IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
26 - 50 of 2260 Matches Previous Page  | Next Page
Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them
sponsored by Lumension
WEBCAST: This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
Posted: 16 Apr 2014 | Published: 31 Dec 2012

RSA, The Security Division of EMC

Health Insurance Association Launches a Security & Integration Cloud Services Brokerage
sponsored by Mashery
CASE STUDY: Read how BCBSA implemented a "mediation layer" that simplified security, integration and aggregation of healthcare information, while enabling users with mobile devices to access this information.
Posted: 16 Apr 2014 | Published: 31 Dec 2012

Mashery

A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
WHITE PAPER: This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Sourcefire

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA, The Security Division of EMC

Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Posted: 16 Apr 2014 | Published: 31 May 2013

Hewlett-Packard Limited

Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Posted: 16 Apr 2014 | Published: 30 Dec 2011

Qualys

EMC Video Surviellance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK: FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014

SearchSecurity.com

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

Cisco: Scaling Application Vulnerability Management Across the Enterprise
sponsored by IBM
WHITE PAPER: This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost.
Posted: 15 Apr 2014 | Published: 28 Feb 2013

IBM

The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER: Access this resource to discover the benefits of cloud-based security, especially for small and medium-sized businesses (SMBs) who have fewer resources when mitigating increasing risks and compliance mandates.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Qualys

10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

SIOS Technology Corp

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you improve efficiencies, reduce risks, and maximize ROI.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool
sponsored by EMC Corporation
PRODUCT OVERVIEW: Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This informative guide explores best practices for choosing a Web application scanning solution.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Signature-less Malware Detection: Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Explore this exclusive resource to discover how one industry leading vendor is fighting against advanced threats, and learn how your business can build a top-notch defense against potentially business-ending security threats.
Posted: 15 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

2013 MarketScope Report for Web Access Management
sponsored by IBM
ANALYST REPORT: This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Posted: 15 Apr 2014 | Published: 15 Nov 2013

IBM

Stalking the Kill Chain
sponsored by EMC Corporation
WHITE PAPER: Access this exclusive resource to uncover the ins-and-outs of the "attacker kill chain", and kick potential security threats to the curb.
Posted: 15 Apr 2014 | Published: 31 Oct 2012

EMC Corporation

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

The Total Economic Impact Of Silver Tail Systems
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this in-depth white paper, Forrester Consulting examines the total economic impact that enterprises may realize by deploying Silver Tail Systems Forensics software.
Posted: 14 Apr 2014 | Published: 31 Aug 2012

RSA, The Security Division of EMC
26 - 50 of 2260 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement