IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
76 - 100 of 3140 Matches Previous Page  |  Next Page
WP IFSW Global Network Survey results
sponsored by Fortinet, Inc.
WHITE PAPER: Fortinet conducted a survey of IT decision-makers from 10 countries around the world. They were asked specifically about the security challenges and decisions that they have to make and their areas of highest concern. Learn what security trends most concern top IT decision-makers
Posted: 09 Feb 2017 | Published: 22 Aug 2016

Fortinet, Inc.

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Dyn

DataSheet-SecondaryDNS2
sponsored by Dyn
WHITE PAPER: When DNS underperformance means a dent in revenue, customer satisfaction, and employee productivity, what can you do? Access this white paper to learn how to ensure your most critical applications remain available on the web and that end users reach those applications faster than with any other solution.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Dyn

A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Preventing Ransomware: Healthcare CIO Discusses Top Technologies
sponsored by Cisco
EGUIDE: In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.
Posted: 07 Feb 2017 | Published: 02 Feb 2017

Cisco

Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017

SearchSecurity.com

Modernize Cybersecurity with Hadoop Data Management and Analytics
sponsored by Cloudera
WHITE PAPER: Explore how to modernize your cybersecurity architecture, detect advanced threats faster, and accelerate threat mitigation with a data-driven strategy. Prepare your organization by leveraging big data, machine learning, and advanced analytics.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

Cloudera

Take Control of the Cloud: How to Accelerate, Simplify, and Deliver
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this video to learn how to simplify application lifecycle management across multiple data centers, private clouds, managed private clouds, and public clouds. Additionally, discover how to deliver hybrid IT as a service, so that users get on-demand experiences, while IT gets governance, visibility, and control.
Posted: 07 Feb 2017 | Premiered: Dec 30, 2016

Cisco Systems, Inc.

How the Houston Astros Protected their Network from Internet Threats
sponsored by ContentKeeper
CASE STUDY: Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco

How a global medical manufacturer routs out ransomware
sponsored by Cisco
CASE STUDY: Access this case study to learn how Octapharma's decision to adopt Cisco's Umbrella security program helped them to secure their expanding network.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

How to Streamline Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Explore how vendor risk management has traditionally been handled, why traditional strategies alone are inadequate, and 3 ways to make vendor risk management more efficient.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

BitSight

IAM on the Cloud: Avoiding Silos and Vulnerability
sponsored by Centrify in partnership with Microsoft
EGUIDE: Access this e-guide now to discover how to use Identity as a Service (IDaaS) to meet both operational and security objectives.
Posted: 03 Feb 2017 | Published: 30 Jan 2017

Centrify in partnership with Microsoft

Financial Technologies Protects its Network From Malware and Other Internet Threats
sponsored by ContentKeeper
WHITE PAPER: Financial Technologies needed help with preventing malware, spoofing, and denial of service attacks. Learn what they did so they can decode, inspect, and filter SSL-encrypted web traffic.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Why SSL Decryption is Critical for Today's Secure Web Gateways & 5 Keys to an Effective Solution
sponsored by ContentKeeper
WHITE PAPER: Discover why SSL decryption is a critical component for today's secure web gateways; and illustrated is a 5-point framework for evaluating these gateways to ensure you handle decryption successfully. Read on to also address the challenges associated with SSL decryption and how these created a big gap in effectiveness among solutions.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Office of the CIO - Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Vendor Analysis: 8 Cloud Security Gateway Providers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this Forrester report, discover a 23-criteria evaluation for cloud security gateway (CSG) providers that identifies, analyzes, and scores the top 8, allowing you to make an educated decision in choosing which one might be the best for your enterprise.
Posted: 03 Feb 2017 | Published: 15 Nov 2016

Symantec & Blue Coat Systems

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

Threat Intelligence: Your Secret Weapon
sponsored by AlienVault
WHITE PAPER: Within 24 months of a major data loss, 72% of businesses are forced to shut their doors. Learn how SMBs can gain the threat data, intelligence, experience, wisdom, expertise, and focused attention needed to identify and control attacks.
Posted: 03 Feb 2017 | Published: 21 Sep 2016

AlienVault
76 - 100 of 3140 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement