IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
26 - 50 of 3417 Matches Previous Page  |  Next Page
Shattering the Single Pane of Glass Management Model
sponsored by JAMF
RESOURCE: 82% of organizations use two or more enterprise mobility management solutions. There is no one-size-fits-all approach to device and OS management. Download this infographic to discover how you could benefit from managing by ecosystem, instead of a single pane of glass management model.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec & Blue Coat Systems

macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

How the Williams Martini Racing Team Protects its Data
sponsored by Symantec & Blue Coat Systems
CASE STUDY: Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Advanced Email Security
sponsored by Proofpoint, Inc.
RESOURCE: Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

Connect With Confidence: Three Steps to Stopping Advanced Email Threats
sponsored by Proofpoint, Inc.
RESOURCE: Your brand may be at risk. Ransomware, business email compromise, and credential phishing may be bypassing your security defenses. Check out this infographic to protect your organization from cyberattacks with 3 steps to fight back.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Proofpoint, Inc.

Cybersecurity Roadmap
sponsored by Cisco Systems, Inc.
WHITE PAPER: Every industry can be targeted by cybercrimes one way or another. Read this white paper to uncover strategies to protect your business from cyberattacks and see how this relates to your specific industry.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Cisco Systems, Inc.

How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing
sponsored by Proofpoint, Inc.
RESOURCE: Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.
Posted: 18 Aug 2017 | Published: 31 May 2017

Proofpoint, Inc.

Computer Weekly – 22 August 2017: How banking technology has changed since the crash
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now.
Posted: 18 Aug 2017 | Published: 22 Aug 2017

ComputerWeekly.com

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: Why stress over the GDPR deadline? Check out this resource to discover a to-do list to ensure you are prepared.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Citrix

The Guide to CryptoLocker Protection and Removal
sponsored by Datto, Inc.
EBOOK: Secure yourself and your business from the leading cyberthreat today: CryptoLocker. Read this e-book to uncover how to mitigate the impact of CryptoLocker by implementing the right strategies.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Datto, Inc.

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

Take Your SIEM to the Cloud
sponsored by Splunk
RESOURCE CENTER: 90% of U.S. CEOs indicate that they have seen the financial, reputational and career consequences of falling victim to a cyberattack. Check out this expert article to uncover security operations center benefits and cloud-based SIEM to improve your security strategy.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Splunk

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
EBOOK: SMBs need to spread awareness to employees regarding cyberattacks. Read this e-book to take a deeper look at tactics to help benefit your company when fighting off cybercrimes.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Datto, Inc.

The Business Guide to Ransomware
sponsored by Datto, Inc.
EBOOK: Implement top-notch security software to prevent the loss of data if a ransomware attack occurs. Read this e-book to discover what you can do to avoid or recover from an attack.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Datto, Inc.

Mac Endpoints Move Into The Enterprise - and Into The Crosshairs of Hackers
sponsored by Palo Alto Networks
WHITE PAPER: Mac computers used to be safe havens—impregnable bunkers—that attackers couldn't figure out how to get into...until now. The threat landscape for Macs is seeing rapid growth. Access this white paper to learn which method is working to prevent malware.
Posted: 17 Aug 2017 | Published: 03 Jul 2017

Palo Alto Networks

Taking Managed Services to the Next Level
sponsored by Datto, Inc.
EBOOK: As the threat landscape changes, security providers must also adapt. In this e-book, learn what it takes to protect against WannaCry and other new attacks, the answer to FAQs about lead generation, Ransomware growth broken down by the numbers, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Datto, Inc.

Run Skype for Business as a Secure Virtual App
sponsored by Citrix
WHITE PAPER: Organizations of every size are adopting virtualized Skype for Business as the perfect solution to meet user expectations and security requirements. Learn more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Machine Learning in Cyber Security
sponsored by Recorded Future
WHITE PAPER: AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

The New Face of Cloud-Based Access management
sponsored by Gemalto
WHITE PAPER: Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

How to Bolster Endpoint Security Protection
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec & Blue Coat Systems

Hybrid Active Directory Security and Governance
sponsored by Quest
WHITE PAPER: Discover how to know in real time when suspicious activities occur in the cloud and on your Microsoft Active Directory by improving your security posture.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Quest

Strengthen Your Defenses Against Cybercrime
sponsored by Mimecast
WHITE PAPER: Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Read this whitepaper to discover how build a cybersecurity plan that will enhance your email security.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Mimecast

Hybrid Active Directory Security Detection and Alerting
sponsored by Quest
EBOOK: Changes to Active Directory are being made daily without your knowledge. Read this e-book to uncover how to suspect inappropriate changes and take action to protect yourself.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Quest
26 - 50 of 3417 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement