IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
26 - 50 of 3135 Matches Previous Page  |  Next Page
Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 5 vital cloud data protection questions and answers in this white paper, covering your organization's first steps into migrating to the cloud all the way to dealing with long-term compliance issues.
Posted: 22 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

A Look at How Data Privacy Laws Impact Cloud Expansion in Germany
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

Top 10 Factors that Ensure VDI Success
sponsored by Pure Storage
EBOOK: Virtual desktop infrastructure (VDI) and desktop as a service (DaaS) are being widely adopted throughout the industry, with many already running VDI on-premise. Access this e-book for the top 10 factors of a successful VDI strategy and why storage is a key component.
Posted: 21 Feb 2017 | Published: 30 Dec 2016

Pure Storage

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
RESOURCE: Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization.
Posted: 21 Feb 2017 | Published: 20 Feb 2017

Symantec & Blue Coat Systems

Experts Debate National Cybersecurity Policy Suggestions At RSAC 2017
sponsored by Absolute
EGUIDE: What exactly are President Trump's potential policies around encryption and international data flow and how might we all be affected? Download and find out the facts direct from the show floor.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Absolute

Putting a Next-Generation Firewall Through Its Paces
sponsored by Forcepoint
WHITE PAPER: See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.
Posted: 20 Feb 2017 | Published: 31 Dec 2015

Forcepoint

Realize the Promise of VDI with Flash Storage
sponsored by Pure Storage
WHITE PAPER: If you're considering a virtual desktop infrastructure (VDI) implementation, or have one that isn't living up to expectations, read this white paper to learn about 4 common problems areas that cause VDI performance issues and how actual end-users were able to solve them with flash storage.
Posted: 20 Feb 2017 | Published: 30 Dec 2016

Pure Storage

What's The Best Risk Analysis Method for Enterprises?
sponsored by Presidio Networked Solutions
EGUIDE: In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.
Posted: 20 Feb 2017 | Published: 16 Feb 2017

Presidio Networked Solutions

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: Uninterrupted access to Internet-based apps, data, and servers are crucial to a successful business. But how do you eliminate downtime that can get in the way? In this white paper, learn how NDFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers to your NGFW technology deployment success: integration with security workflow, total cost of ownership, and security effectiveness. But which one will work best for your distributed enterprises? In this webcast, learn key features to consider when selecting your technology, and discover insights on the testing process.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately, learn what benefits you can expect for your business.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

10 Reasons Why Your IT Incidents Aren't Resolved Faster
sponsored by EverBridge Inc.
WHITE PAPER: When disaster strikes, one of the most important aspects of your recovery strategy is communication. Access this white paper to learn the top 10 reasons why your IT incidents are taking time to resolve and how improving your communication strategy helps prepare you to handle the unexpected.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

EverBridge Inc.

IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment
sponsored by Forcepoint
WHITE PAPER: In this report excerpt learn about the email security market, how it is experiencing an influx of new features to deal with adapting threats, and how Forcepoint has been named a leader in the market.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Forcepoint

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to ensure that your mobile devices, data, and user identities are secured. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately learn what benefits you can expect for your business.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
TRANSCRIPT: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 16 Feb 2017 | Published: 09 Feb 2017

AttackIQ

Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity
sponsored by IBM
CASE STUDY: The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

IBM

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

5 Key Questions About Hybrid Cloud
sponsored by Microsoft
EBOOK: In a world overrun by big data, there's only storage option to keep you head above water...way above it. Hybrid cloud: coming soon to an IT environment near you.
Posted: 15 Feb 2017 | Published: 30 Dec 2016

Microsoft

Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority
26 - 50 of 3135 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement