IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
76 - 100 of 2956 Matches Previous Page  |  Next Page
When Do Managed Security Services Makes Sense?
sponsored by Digital Guardian
WHITE PAPER: This resource discusses the benefits of investing in security services and helps you determine whether security services are the right choice for you.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Obtaining Network Information for Successful Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how advanced network monitoring technologies can help you detect even the subtlest attacks.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

Secure Remote Data Collection for Better Data Use
sponsored by Splunk
WHITE PAPER: This white paper describes how a secure method of remote data collection can enable your enterprise to better analyze and leverage all the data in your network, not just the data generated in a central location.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

A Big Data Approach to Enterprise Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how big data can help you obtain a more advanced level of threat intelligence that can detect new forms of malware.
Posted: 17 Aug 2015 | Published: 31 Dec 2012

Splunk

SSL Decryption: Uncovering The New Infrastructure Blind Spot
sponsored by Gigamon
WHITE PAPER: This white paper makes the case for adopting SSL decryption to protect your enterprise.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Gigamon

Four Steps to a Proactive Big Data Security Strategy
sponsored by IBM
WHITE PAPER: This white paper introduces four essential steps to proactively securing all the data in your enterprise.
Posted: 17 Aug 2015 | Published: 30 Jun 2014

IBM

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Managing Threats and Remediating Risk for State of Vermont Applications
sponsored by Core Security Technologies
WHITE PAPER: In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Enterprise MAM Takes Center Stage: The Next Chapter in Mobile Strategy
sponsored by Apperian, Inc.
WEBCAST: In this webcast, Gartner Research Director Chris Silva and Steven Wheat, Chief Information Technology Architect at Emory Healthcare, look at how organizations use mobile application management to securely deliver mobile apps. Tune in now to key into these can't-miss MAM strategies.
Posted: 17 Aug 2015 | Premiered: Aug 17, 2015

Apperian, Inc.

Data Protection Systems and Practices
sponsored by Oracle Corporation
EGUIDE: This expert guide can help you make sure your sensitive data stays secure. In it, you'll find articles addressing some essential techniques and common questions regarding data protection.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Research Infographic: Moving Enterprise Applications to the Cloud
sponsored by IBM
WHITE PAPER: This infographic provides recent insights from the research firm Pierre Audoin Consultants (PAC) on how to orchestrate a successful cloud migration. Read on to learn about the importance of infrastructure management services and the benefits of cloud managed services.
Posted: 17 Aug 2015 | Published: 31 Jul 2014

IBM

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WEBCAST: This webcast discusses specific ways to address zero-day risks and fight exploit attempts.
Posted: 17 Aug 2015 | Premiered: Jul 31, 2015


Five Critical Questions You Should Be Asking SIEM Vendors
sponsored by Splunk
WHITE PAPER: This white paper examines one solution that provides agile threat response via a combination of pre-built data views and ad hoc analysis. Read on here to find out how to and cultivate the knowledge of your security practitioner by asking questions of potential vendors.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Splunk

Business Drivers for Next Generation Authentication
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper discusses how today's complex authentication environment impacts users and IT professionals alike, and how you can lessen these impacts without lessening security.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

SafeNet, Inc.

Splunk® and Amazon Web Services (AWS)
sponsored by Splunk
WHITE PAPER: This white paper highlights a solution that offers real-time visibility into cloud management, infrastructure, and applications. Read on to learn how you can monitor AWS using this solution or deploy it directly within the AWS environment so you can gain insight into your AWS activity.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Splunk

Brother Secures Employee Access and Reduces Costs with Cloud-based Authentication
sponsored by SafeNet, Inc.
CASE STUDY: This case study reveals how using cloud based authentication helped one company secure employee access, while simultaneously lowering cost.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

SafeNet, Inc.

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Technology for Simplified SOC Creating
sponsored by Splunk
WHITE PAPER: This white paper discusses the importance of an SOC and gives suggestions for implementing technology that simplifies the process of SOC creation.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

Achieving Data-Drive Security Intelligence
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can obtain the kind of data-driven security that's needed for combatting today's advanced threats.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

The Evolution of Ransomware
sponsored by Symantec Corporation
WHITE PAPER: The white paper gives you an extensive look at the origins, development, and functioning of ransomware.
Posted: 14 Aug 2015 | Published: 06 Aug 2015

Symantec Corporation

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Aug 2015 | Published: 31 Jan 2014

Hewlett-Packard Company

Advanced Threat Detection and Response
sponsored by Splunk
WHITE PAPER: This white paper explains how to detect advanced threat activity from both the host and the network perspectives and advises on several solutions to combat these threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Splunk

Financial MDM: Bringing Secure BYOD to You
sponsored by IBM
WHITE PAPER: This white paper examines the growth of bring your own device (BYOD) culture in financial services, and outlines the host of security challenges IT finance departments face when implementing MDM. Click through to address your financial mobility concerns with a cloud-based solution.
Posted: 13 Aug 2015 | Published: 31 Dec 2014

IBM

Tools, Comparisons, and Scenarios for Threat Intelligence Services
sponsored by Cyveillance, Inc.
EGUIDE: This expert guides separates the benefits of threat intelligence from all the sales talk that usually surrounds the product, discussing exactly what it can do and who really needs it.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Cyveillance, Inc.
76 - 100 of 2956 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement