IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
51 - 75 of 2823 Matches Previous Page  |  Next Page
Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Compensating Security Controls for Windows Server 2003 Security
sponsored by TrendMicro
WHITE PAPER: This white paper shows you a solution while you're in the process of migration. Learn how you can get network, system and anti-malware security controls across physical, virtual and cloud systems running W2K3.
Posted: 04 Feb 2016 | Published: 31 May 2015


Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centers and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Cisco Advanced Malware Protection for Endpoints
sponsored by Cisco
WHITE PAPER: This white paper shows you endpoint security that goes beyond point-in-time detection to provide the level of visibility and control you need to stop advanced threats.
Posted: 04 Feb 2016 | Published: 27 Jan 2016

Cisco

2016 Annual Security Report
sponsored by Cisco
WHITE PAPER: This security report presents research, insights and perspectives highlighting the challenges that defenders face in blocking attackers.
Posted: 04 Feb 2016 | Published: 01 Feb 2016

Cisco

Addressing the Full Attack Continuum Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: In this white paper, you will discover a new threat-centric security model that delivers visibility and control your business needs across its extended network.
Posted: 04 Feb 2016 | Published: 31 Dec 2014

Cisco

Layered Security Strategies for a Mobile-First World
sponsored by Microsoft
WHITE PAPER: This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.
Posted: 03 Feb 2016 | Published: 27 Nov 2015

Microsoft

Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: This white paper discusses attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

BitSight

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: This white paper shows you the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure
sponsored by TrendMicro
WHITE PAPER: In this white paper, discover how to address cloud security with comprehensive administrative, physical and logical controls.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

A Fortune 200 Global Manufacturing Services Company
sponsored by Digital Guardian
WHITE PAPER: This white paper tells the success story of Jabil, a company struggling with data visibility issues.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

Advanced Threat Defense
sponsored by Blue Coat Systems
EGUIDE: This e-guide will teach you the steps your business should take to protect against new, more advanced threats.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will show you statics of cybercrime and give you tactics to proactively deter attackers.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

2015 Cybersecurity: Attack Resiliency Challenges Industry Collaboration
sponsored by Cisco
WHITE PAPER: This white paper shows you the trends of cybercrime and why their attacks continue to win over businesses trying to keep them out.
Posted: 03 Feb 2016 | Published: 01 Jan 2016

Cisco

Holistic Data Protection Center: Compliance & E-discovery
sponsored by Commvault
RESOURCE CENTER: In this article, you will discover a holistic and automated approach to retaining and accessing the right information across your network.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Commvault

Detect Risky User Behavior Using Data Science
sponsored by Palerra Inc.
EGUIDE: This expert e-guide explores how insider threats are driving new approaches to user behavior analytics. Discover how these new technologies use data science to monitor user activity within the network and uncover potential security breaches.
Posted: 02 Feb 2016 | Published: 28 Jan 2016

Palerra Inc.

Webinar on demand: Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST: This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016

Prelert

Monitoring that Cloudy Network
sponsored by SearchSecurity.com
EBOOK: Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchSecurity.com

Prevent Cybercriminals from Taking Down your Business
sponsored by Microsoft
WHITE PAPER: This infographic reveals what companies are doing right (and wrong) in their security initiatives, and what it's costing them. Uncover technologies that not only build bigger walls against attacks, but also lock criminals out altogether.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Microsoft

Get the Message: Why Secure Texting Matters
sponsored by SearchHealthIT.com
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchHealthIT.com

Financial Sector Threats: 2015 Year in Review
sponsored by Digital Shadows
WHITE PAPER: In this white paper, you will read about threat activity in the financial sector as of 2015. It identifies new threats and includes public incidents of note such as extortion, malware and other sophisticated threats.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Are Energy and Utilities at Risk of a Major Breach?
sponsored by BitSight
WHITE PAPER: This white paper discusses the security performance of six key industry sectors.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight
51 - 75 of 2823 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement