IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
26 - 50 of 3353 Matches Previous Page  |  Next Page
4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: Uncover 4 critical factors organizations should consider before designing their GRC deployment so that they can properly satisfy key use case needs, mitigate risks, and meet compliance regulations.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Rsam

Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell India
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell India

Power of Proxy in Security
sponsored by Symantec & Blue Coat Systems
WEBCAST: With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threat, the "too many devices" problem, ensure compliance, and more.
Posted: 19 Jun 2017 | Premiered: Jun 6, 2017

Symantec & Blue Coat Systems

What Continuous Data Protection Looks Like
sponsored by Dell EMC and Intel®
VIDEO: Discover how to reduce risk while saving time and money securing your data center, whether you are looking for converged or hyper-converged systems to meet the right use case for your organization.
Posted: 19 Jun 2017 | Premiered: 20 Jun 2017

Dell EMC and Intel®

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform
sponsored by Gigamon
EBOOK: Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Gigamon

Report: Your Guide to Today's Healthcare Threat Landscape
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover 6 threats to your healthcare organization and how they have evolved over the past year, what specific dangers they pose to your healthcare organization, and what you can do to mitigate their harm.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec & Blue Coat Systems

Symantec GDPR
sponsored by Symantec & Blue Coat Systems
VIDEO: With severe financial penalties for GDPR non-compliance, enterprises can't just plan to afford to pay the fine. Discover what your organization needs to help prepare for the GDPR in May 2018.
Posted: 16 Jun 2017 | Premiered: 06 Jun 2017

Symantec & Blue Coat Systems

An App - Centric Approach to Mobile Security in Healthcare
sponsored by Blue Cedar
WHITE PAPER: In this brief white paper, learn about a new mobile security suite that makes protecting your devices as simple as downloading one application.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

6 Tips for Msps ro Enhance Their Offerings
sponsored by SolarWinds, Inc.
WHITE PAPER: By enhancing their capabilities, MSPs are able to differentiate their service, be more proactive, and command higher margins. Learn 6 tips on how your MSP can enhance its offerings and provide your clients with superior, modern protection.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

SolarWinds, Inc.

Log Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER: The log management space is confusing, noisy, and crowded with solutions that are often very similar or vague about their offerings. Discover 11 questions that you should be asking when shopping for a log management solution.
Posted: 16 Jun 2017 | Published: 16 Jun 2017


10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec & Blue Coat Systems

Evolving Your Security Operations To Face Today's Threats
sponsored by Fortinet, Inc.
WHITE PAPER: The negative long-term effects of a data breach cannot be understated. Learn now how to reduce the complexity in managing security, performance, and compliance with a comprehensive, single-pane-of-glass approach.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Fortinet, Inc.

Securing Big Data to Create Actionable Insights
sponsored by AWS - Alert Logic
WHITE PAPER: Learn how Retail Insights, LLC was able to guarantee that it was consistently achieving the highest standards of data integrity and security for its clients on the cloud.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

AWS - Alert Logic

Accelerating Government IT Innovation With APIs and Microservices
sponsored by MuleSoft
WHITE PAPER: Government IT teams are struggling to keep pace with citizen expectations constantly being raised by the private sector. This white paper proposes a way government agencies can change their IT operating models to an architectural approach focused on APIs and microservices.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

MuleSoft

Accelerating Mobile App Adoption with Frictionless Security
sponsored by Blue Cedar
WHITE PAPER: In this white paper, learn about a new kind of mobile security that injects security code directly into existing applications to encrypt data, provide authentication protocols, and more.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

An All-In-One Data Protection Infographic
sponsored by Dell EMC Intel®
RESOURCE: Learn how to focus on growing your business rather than worrying about your data's safety. Access this infographic and discover how to protect your data at every point possible.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Dell EMC Intel®

9 Ways to Solve the GDPR Compliance Challenge
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores 9 technologies that can help you meet GDPR compliance and avoid the hefty fines associated with it.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec & Blue Coat Systems

Why Backup is Broken
sponsored by SolarWinds, Inc.
WHITE PAPER: Learn how to address the vulnerability created by broken backup, and what the restoration revolution will look like. Also discover the obstacles to efficient backup, why backup is slow and unreliable, and more.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

SolarWinds, Inc.

Your Guide to Mitigating Phishing Attacks
sponsored by PhishMe
WHITE PAPER: As one of the most persistent types of attacks, spear-phishing cannot be ignored. Discover the importance of implementing an incident response program that directly tackles phishing attacks.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn from expert Doug Cahill, ESG Senior Analyst, as he investigates a prescriptive approach to mitigate the risk associated with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

TrendMicro

Secure the App, Not the Device. Accelerate the Benefits of Mobility
sponsored by Blue Cedar
EBRIEF: Open up this solution brief to learn about the current state of mobile security, and how the app, not the device became the center for security operations. Then, learn about a new way to inject security code into pre-existing app without disrupting the user experience.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Blue Cedar

Malware Review Q1 2017
sponsored by PhishMe
WHITE PAPER: Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Secure Your Data and Meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: Every company that takes card payments needs to comply with PCI DSS v3.1, and the requirements can get complicated quickly. Learn how to kill two birds with one stone and secure your organization while setting yourself up to comply with PCI DSS v3.1 requirements.
Posted: 15 Jun 2017 | Published: 31 Oct 2015

TrendMicro

11 Policies to Keep Your Apps Secure
sponsored by Blue Cedar
WHITE PAPER: This white paper outlines a suite of app platform policies to help you secure your applications and govern who has access to them, including certificate management, network integration control, secure microtunnels to application's back-end service, and more.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Blue Cedar
26 - 50 of 3353 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement