IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
51 - 75 of 2958 Matches Previous Page  |  Next Page
What You Need to Know Now About Next Generation Data Protection Architecture
sponsored by arcserve
WHITE PAPER: This white paper walks you through the driving forces behind rapidly evolving data protection architectures, the trends you'll want to keep an eye on, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

arcserve

Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014

Splunk

UC&C Is Revolutionizing IT: How Can You Be a Part of It?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains how to implement UC&C upgrades, maximize productivity and leverage real-time applications. Read on to learn how to transform your enterprise with BYOD and UC&C.
Posted: 19 Aug 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Your Layered Security Defenses are Riddled with Holes… Here's what to do instead
sponsored by Malwarebytes Corporation
WEBCAST: In this webcast, security experts discuss the holes in the typical layered security approach and outline steps you can take to make your security program truly successful.
Posted: 19 Aug 2015 | Premiered: Jul 27, 2015


Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the complex issue of achieving data sovereignty without sacrificing the benefits of the cloud.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

IntraLinks, Inc

The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. Click here to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

How a New Alliance Addresses the Changing Security Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: The threats to your company are growing more sophisticated. Learn why you need expert help to be sure your data remains secure and compliant.
Posted: 18 Aug 2015 | Published: 19 Aug 2015

TOPICS:  Security
Hewlett-Packard Company

Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by SafeNet, Inc.
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SafeNet, Inc.

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Securing the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper to learn how to successfully secure your enterprise in the cloud and see why this is important for customer retention.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Symantec Corporation

A guide to multi-layered web security
sponsored by Akamai
ESSENTIAL GUIDE: This essential guide details threats common to websites and web applications and what you can do to mitigate them. Read on to learn more.
Posted: 18 Aug 2015 | Published: 31 Dec 2014

Akamai

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

Protect Your Business Critical Apps from Compromise
sponsored by Onapsis
WHITE PAPER: This white paper describes how, with technologies ranging from vulnerability management to advanced threat protection, you can make sure your SAP applications stay secure.
Posted: 18 Aug 2015 | Published: 31 May 2015

Onapsis

5 Ways to Determine Cloud Readiness at the Speed of Your Business
sponsored by Hewlett-Packard Limited and Intel ®
RESOURCE: This informative brochure explains how and why IT can explore, develop, and deploy mobile and big data services faster in a cloud environment. Read now to discover 5 questions that can help determine your infrastructure's cloud readiness.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Hewlett-Packard Limited and Intel ®

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout

Case Study: State Agency Bolsters Security & Operational Efficiencies
sponsored by Splunk
WHITE PAPER: This case study describes how the Nevada Department of Transportation enhanced its security and its efficiency with better log management.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Splunk

How to use threat intelligence with SIEM successfully
sponsored by AlienVault
EGUIDE: Access this expert e-guide to discover the secrets to a successful SIEM deployment. Also, learn the advantages of using threat intelligence with SIEM – including where threat intelligence data comes from.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

AlienVault

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Content Is the New Perimeter: The Security and Regulatory Drivers for IRM
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the challenges of securing digital information, even when that information resides outside the perimeter.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

IntraLinks, Inc

Don'€™t Jeopardize Security When Moving to Office 365
sponsored by McAfee, Inc.
WHITE PAPER: Access this expert white paper to discover the security risks related to the migration to Office 365 and other cloud-based applications. Also, learn how to avoid these risks with a comprehensive security solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

McAfee, Inc.

Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

ComputerWeekly.com

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Aug 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian
51 - 75 of 2958 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement