IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
76 - 100 of 2855 Matches Previous Page  |  Next Page
Securing Your Applications and Protecting Your Systems
sponsored by WhiteCryption
EGUIDE: Access this expert e-guide to explore the pros and cons of replication and erasure coding to help you determine which method of data protection is best for your data center. Also, learn why applications experts say frameworks that enforce secure coding provides a better way for developers to write apps that can withstand attacks.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

WhiteCryption

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Data masking everywhere
sponsored by IBM
WHITE PAPER: Read this white paper now to learn how data masking can protect your sensitive information from hackers.
Posted: 16 Mar 2015 | Published: 31 May 2014

IBM

Meet Health Industry Regulations and Secure Sensitive Health Files
sponsored by Ipswitch File Transfer
CASE STUDY: Access this case study to learn how one health insurance provider was able to securely manage, view and control all of their file transfer activity with an automated system.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Desktop SSO: Simple Authentication for Greater Productivity
sponsored by OneLogin
WEBCAST: This webcast introduces a single sign-on (SSO) program that will enable users to access to all their cloud apps with one login.
Posted: 16 Mar 2015 | Premiered: Dec 17, 2014

OneLogin

How to Extend Active Directory to the Cloud
sponsored by OneLogin
WEBCAST: This webcast shows you how to integrate Active Directory and cloud-based apps for better security.
Posted: 16 Mar 2015 | Premiered: Nov 19, 2014

OneLogin

How to Automate User Provisioning
sponsored by OneLogin
WEBCAST: This webcast explores the risk of cloud applications and how you can ensure secure application management for your enterprise.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

OneLogin

Is Mobile Access to Cloud Apps Putting Your Company At Risk?
sponsored by OneLogin
WEBCAST: This webcast discusses the security risks of mobile cloud apps and the best ways to mitigate them.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

OneLogin

Leveraging AWS Data to Manage Spend and Allocate Costs
sponsored by Cloudcheckr
WEBCAST: This webcast details how to best harness AWS cost data and learn about more cost management strategies.
Posted: 16 Mar 2015 | Premiered: Jan 22, 2015

Cloudcheckr

Openness & Ecosystem Integration
sponsored by Cisco Systems, Inc.
VIDEO: This video highlights the openness of Cisco ACI, and reveals how customers across the board enjoy how it can integrate well with their current ecosystem.
Posted: 13 Mar 2015 | Premiered: 04 Feb 2015

Cisco Systems, Inc.

Accelerate Data Center Transformation with Private Cloud, Integrated Infrastructure
sponsored by NetApp & Cisco
WHITE PAPER: Access this exclusive white paper to explore the reasons why IT organizations are using pre-validated integrated infrastructure solutions to successfully make this transition. Find out the trends that are driving the need for private clouds and data center transformation.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

NetApp & Cisco

Making Sign-on Simple and Secure
sponsored by SearchSecurity.com
EBOOK: Single sign-on has a complicated history. This technical guide brings you up to date on how the main protocols for single sign-on -- OpenID and Security Assertion Markup Language (SAML) -- compare and how they can be connected to the pieces you already have. While SAML seems to be winning the field, OpenID shouldn't be ruled out.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Security | SSO
SearchSecurity.com

Log Management Solution for IT Big Data
sponsored by TIBCO Software Inc.
WHITE PAPER: Read this white paper to learn about a log management solution for compliance, security, and IT operations management.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TIBCO Software Inc.

A10 Networks Joins the Cisco ACI Ecosystem
sponsored by Cisco Systems, Inc.
VIDEO: This video contains an interview between A10 Networks CTO, Raj Jalan, and Cisco Sr. Director, Shashi Kiran, in which they discuss a new application-centric infrastructure (ACI) solution.
Posted: 12 Mar 2015 | Premiered: 26 Jan 2015

Cisco Systems, Inc.

Open Your Eyes to Discover Cisco APIC
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights an innovative data center architecture that simplifies, optimizes, and accelerates the entire application lifecycle through a common policy management framework.
Posted: 12 Mar 2015 | Published: 01 May 2014

Cisco Systems, Inc.

Experiences from the Field - Detailed Data Security Case Study
sponsored by IBM
VIDEO: Watch this exclusive video to hear from Product Marketing integration and governance specialist, Jeff Scheepers of IBM to learn more about the new emphasis being placed on database security in today's business landscape. Continue to watch hear about industry leaders' security issues and how they were able to resolve them.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Information security in the retail chain
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Mitigating the cyber threat from malicious insiders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Trends in packing and obfuscation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Building trust in the security of RFID systems
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

TOPICS:  RFID | Security
ComputerWeekly.com

Database Vulnerability Assessment Tool: Determine the Efficacy of Your Database Protection System
sponsored by IBM
ASSESSMENT TOOL: Access this vulnerability assessment evaluation package which provides you with a simple tool that you can download for free, set up easily, and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

IBM

Windows 8.1 Security: New and Improved
sponsored by ESET
WHITE PAPER: This white paper goes in-depth into the new security features of Windows 8.1.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Protect Your Data with Advanced Encryption
sponsored by ESET
WHITE PAPER: This resource introduces one way you can create unbreakable security for your data.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Build a Strong Security Foundation with the Right Endpoint Protection
sponsored by ESET
WHITE PAPER: This white paper describes one endpoint protection solution that has proven to provide a strong foundation.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

What to look for in secure file transfer
sponsored by SearchSecurity.com
EBOOK: This guide provides essential knowledge for enterprise InfoSec pros acquiring tools and products to transfer files efficiently and securely.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

SearchSecurity.com
76 - 100 of 2855 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement