IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
76 - 100 of 2559 Matches Previous Page  | Next Page
The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

Gaining Control of the Cloud
sponsored by Gravitant
WHITE PAPER: This whitepaper covers how you can identify risks in the public cloud and offers a software solution to help keep you safe.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Gravitant

Compliance in the Cloud
sponsored by Alert Logic
EGUIDE: This expert e-guide introduces 5 simple tips to help improve your enterprise's threat and vulnerability management program.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Alert Logic

Web Application Firewalls: Patching, SDLC Key for Security Compliance
sponsored by Alert Logic
EGUIDE: This eGuide explains how web application firewalls can help to patch vulnerabilities in web applications and protect your enterprise from current and future threats.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Weather centre secures remote access with HID Global’s strong authentication
sponsored by HID
CASE STUDY: In this case study featuring The European Centre for Medium Range Weather Forecasts (ECMWF), forecasts are gathered through data from satellites, buoys, ships and aircrafts—and all facilities across Europe need to remotely access this information.
Posted: 11 Jul 2014 | Published: 25 Mar 2013

HID

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Imperva Security Solutions
sponsored by Imperva
WHITE PAPER: This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Auditing Security Checklist for Use of AWS
sponsored by Amazon Web Services
WHITE PAPER: This paper is designed to help internal compliance teams and their external auditors with a checklist for assessing an organization's AWS security strategy.
Posted: 11 Jul 2014 | Published: 30 Jun 2014


How Web Application and Next Generation Firewalls Stack Up Against OWASP Threats
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls--web application firewalls and next generation firewalls--measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP) threats.
Posted: 11 Jul 2014 | Published: 31 Dec 2013

Imperva

Providing a single source for secure identity solutions
sponsored by HID
WHITE PAPER: Access this white paper to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

The Anatomy of an Anonymous Attack
sponsored by Imperva
RESOURCE: This infographic depicts the timeline of attacks perpetrated by hacktivist group Anonymous, notorious for its DDoS attacks on controversial organisations around the world.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Imprivata Cortext: Secure Communications Platform for Healthcare
sponsored by Imprivata
WHITE PAPER: This IDC Health Insights white paper, sponsored by Imprivata, presents key findings of interviews with three healthcare IT executives at Atlantic Health System, Carolinas Pathology Group, and Beaufort Memorial Hospital regarding the deployment of Imprivata Cortext, a secure communications platform.
Posted: 11 Jul 2014 | Published: 31 May 2014

Imprivata

Emerging Security Threats: Know Your Enemy in 2014
sponsored by BitGlass
WEBCAST: In this webinar, discover the process that cybercrime undergoes and how it directly affects the victim.
Posted: 11 Jul 2014 | Premiered: Jun 24, 2014


Enterprise File Synchronization and Sharing
sponsored by Accellion, Inc.
WHITE PAPER: This white paper discusses the current maturation of the enterprise file synchronization and sharing (EFFS) market, which will benefit organizations looking for solutions to support their increasingly mobile workforce and support BYOD initiatives.
Posted: 11 Jul 2014 | Published: 02 Jul 2014

Accellion, Inc.

Presentation Transcript- Emerging Security Threats: Know Your Enemy in 2014
sponsored by BitGlass
TRANSCRIPT: In this webinar transcript, discover the process that cybercrime undergoes and how it directly affects the victim.
Posted: 11 Jul 2014 | Published: 24 Jun 2014


Best Practices for Selling Best-of-Breed Solutions
sponsored by Webroot
WHITE PAPER: This white paper describes the many advantages to the best-of-breed approach to selecting technologies from multiple providers, and also offers a number of helpful suggestions for VARs to capitalize on this approach.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: Consult this exclusive report to get a complete overview of security processes on AWS. Specifically, AWS physical and operational security processes are described for network and server infrastructure under AWS's management, as well as service-specific security implementations.
Posted: 10 Jul 2014 | Published: 30 Jun 2014


Podcast - Emerging security threats: Know your enemy in 2014
sponsored by BitGlass
PODCAST: In this podcast, discover the process that cybercrime undergoes and how it directly effects the victim.
Posted: 10 Jul 2014 | Premiered: Jun 24, 2014


Nissan Europe Drives Security with HID Global’s Smart Employee ID
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe, which manages their cars across 34 European countries. The organization was on the hunt for a solution that would easily enable future applications and credentials by using a single dual-chip smart card.
Posted: 10 Jul 2014 | Published: 25 Mar 2013

HID

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

SearchSecurity.com
76 - 100 of 2559 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement