IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
51 - 75 of 3297 Matches Previous Page  |  Next Page
Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

What it Takes for Encryption Key Manager to Combat Today's Threats
sponsored by Gemalto
WHITE PAPER: Learn how to manage your existing keys from third-party solutions, while offering you a full portfolio of flexible encryption options that work on-premises, in traditional data centers, and in virtualized public or private-cloud environments.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Securing Data Across Your Every Environment
sponsored by Gemalto
WHITE PAPER: Learn about cryptographic keys and how they can secure your vital data. Discover the 4V's model, how the level of encryption is applied, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Office 365: How to Deploy Truly Comprehensive Security
sponsored by Proofpoint, Inc.
RESOURCE: Find 10 tips for securing Office 365, including considerations for deploying effective email protection, blocking credential phishing, preventing business email compromise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Proofpoint, Inc.

How to Keep Your Data Secure Without a Big Security Team
sponsored by Armor
WHITE PAPER: Uncover how your organization can not only centralize your security management processes, but also increasingly support your business objectives and protect your sensitive data inside and out.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

How mobile remote desktop apps work
sponsored by LogMeIn Rescue Lens
EGUIDE: Mobile remote desktop apps can be an important tool for mobile workers. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
Posted: 13 Mar 2017 | Published: 10 Mar 2017

LogMeIn Rescue Lens

Mitigate the Harm a Lack of Security Professionals Can Do
sponsored by Armor
WHITE PAPER: Cybersecurity is a tricky subject in today's threat landscape. Learn how to gain a significant cybersecurity advantage, providing your organization with proactive vulnerability scanning, continuous patching and monitoring, dedicated compliance expertise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: In this white paper find how to set up your enterprise for future Internet of Things success, how to handle common problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: In this in-depth report conducted by the Ponemon Institute, uncover trends that are arising in cloud governance and security practices, how they can affect your organization, and recommendations on improving cloud governance.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Why Perimeter Defenses Fail in the Face of Modern Threats
sponsored by Gemalto
WHITE PAPER: Discover what security features businesses are focusing on, why perimeter defense is not a cure-all for data breaches, and the consequences for not proofing your organization adequately for the modern threat landscape.
Posted: 13 Mar 2017 | Published: 31 May 2016

Gemalto

Product Overview: When Tools Have Failed, You're Ready For Better Security Outcomes
sponsored by Armor
PRODUCT OVERVIEW: For your organization, security control, management and threat intelligence tools are invaluable. They allow you to do the work you need to do without worrying about outside 'what-ifs.' In this overview, learn about a security tool by Armor, which can help you reduce dwell times, maximize your overall security posture, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

ComputerWeekly.com

How To Recover Data From Server Failure
sponsored by Quest
PRODUCT OVERVIEW: When a server fails, you need data restored in minutes rather than hours in order to minimize the impact to the business. Inside this technical brief, learn about a tool by Quest that can help you recover data and apps from a server failure in a few simple steps.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Quest

CW ASEAN March 2017: Raising national security standards
sponsored by TechTarget ANZ
EZINE: In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


Secure Mobile Access for BYOD
sponsored by SonicWall
WHITE PAPER: Bring-your-own-device (BYOD) initiatives carry inherent risks. And securing BYOD with layers of disparate technologies can create security gaps. This e-book explores how converged tools can ensure mobile workforce management and mobile security management.
Posted: 10 Mar 2017 | Published: 30 Dec 2016

SonicWall

CW ANZ March 2017: Take cover from cyber threats
sponsored by TechTarget ANZ
EZINE: In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


The Different Types of Cyber-Attacks and How to Prevent Them
sponsored by SonicWall
WHITE PAPER: This e-book explores four primary strategies cybercriminals use to infiltrate your network, and best practices for countering them. Learn how you can successfully combat common cyber-attacks ransomware, encrypted attacks and more.
Posted: 10 Mar 2017 | Published: 30 Dec 2016

SonicWall

SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race
sponsored by SonicWall
WHITE PAPER: This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.
Posted: 10 Mar 2017 | Published: 31 Jan 2017

SonicWall

THE SILVER LINING - Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
RESOURCE: In this quick infographic discover the hard numbers on how to protect corporate information in the cloud, and how the numbers of companies not embracing the cloud is shrinking.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Symantec & Blue Coat Systems

The Benefits of Public Cloud for Data Protection
sponsored by Quest
WHITE PAPER: Learn about another opportunity to use public cloud to make existing IT better. Uncover how to leverage the public cloud, or infrastructure-as-a-service (IaaS), for backup and recovery enabled data protection.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Quest

Hackers Have a Plan to Get to Your Privileged Accounts
sponsored by One Identity
WHITE PAPER: Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

Strategies to Ensure Success for your Privileged Management Project
sponsored by One Identity
WHITE PAPER: Learn how to properly secure, manage, and govern the accounts belonging to "superusers" – privileged accounts.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

Security and Risk Consulting Overview
sponsored by Dell SecureWorks
DATA SHEET: Consulting services help you rearrange your priorities to keep you secure and compliant. Access this resource now to learn what to look for in a security consulting service.
Posted: 10 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

Evaluating the Top Application Security Testing Vendors
sponsored by Veracode, Inc.
RESOURCE: This Gartner report focuses on top AST vendors' SAST, DAST and IAST offerings, maturity and features as tools or as a service. Learn all you need to know about top vendors' AST offerings to ensure you're picking the right tool for your business.
Posted: 10 Mar 2017 | Published: 28 Feb 2017

Veracode, Inc.
51 - 75 of 3297 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement