IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
76 - 100 of 2936 Matches Previous Page  | Next Page
How to deliver more secure automotive software
sponsored by Rogue Wave Software
RESOURCE: In October 2014, Toyota recalled 2.1 million vehicles globally because of a software problem that could cause cars to stop suddenly. Check out this concise infographic that addresses ways to ensure that the code that automotive software developers are building is safe, secure, and reliable.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Rogue Wave Software

Minimize Check Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

Anti-Money Laundering Controls
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exlusive white paper examines a workflow solution that helps organizations stay compliant and reap the benefits of doing so. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Hewlett-Packard Limited

Solution Brief: Drive More Profit in a Turbulent Market
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper takes an in-depth look at a workflow security solution that was able to deliver rock-solid security. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Hewlett-Packard Limited

Closing Security Gaps in Mobile Applications
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper takes an in-depth look at mobile security.  Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

CA Technologies.

Ensuring Progress Toward Risk Management and Continuous Configuration Compliance
sponsored by IBM
WHITE PAPER: This exclusive white paper takes an in-depth look at one endpoint management solution that helped apply, enforce, and manage endpoint security and risk. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

IBM

How important is it to have a secure and reliable web application infrastructure?
sponsored by Akamai Technologies
WEBCAST: This exclusive webcast takes an in-depth look at a web security solution that was able to deliver rock solid security without risking performance or cost. View now and take the first step towards a safer enterprise network.
Posted: 10 Nov 2014 | Premiered: Nov 10, 2014

Akamai Technologies

What can businesses do to protect themselves from Distributed Denial of Service (DDoS) and web application attacks?
sponsored by Akamai Technologies
VIDEO: A solution more and more companies are turning to is cloud based service approach. You can scale the service to deal with ever increasing threats in a cost effective manner. Download and view this video to get an inside look at Forrester Research's findings regarding DDoS and application attacks.
Posted: 07 Nov 2014 | Premiered: 30 Oct 2014

Akamai Technologies

What is the impact to businesses when their web infrastructure is attacked?
sponsored by Akamai Technologies
VIDEO: Edward S Ferrara, Vice President & Principal Analyst at Forrester delves into the direct and indirect costs of attacks. To prepare yourself for attacks, download and view this video as a resource to refer to later when arming yourself against hackers.
Posted: 07 Nov 2014 | Premiered: 03 Nov 2014

Akamai Technologies

Denial of Service Use Case for Predicting Outages before they Occur
sponsored by IBM
VIDEO: This video demo provides an overview of how IBM SmartCloud Analytics Predictive Insights helps provide early warning in preventing a security attack.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

IBM

Information Security Magazine – November 2014
sponsored by SearchSecurity.com
EZINE: The votes are tallied. More than 1,700 security practitioners participated in our Security Readers' Choice Awards 2014. Did your tools make the cut?
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE: This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Verisign, Inc.

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

New Topics on the 2014 Security+ SY0-401 Exam
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper details the changes to the CompTIA Security + exam and helps you prepare for the test.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Risk & Compliance Monitoring
sponsored by Software AG
VIDEO: This exclusive video covers a platform-based solution with real-time analytics that can help you manage risk and stay compliant.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

Software AG

Upgrade to SIP Safely and Efficiently: Using a Software SBC add on for existing Asterisk-based PBX deployment
sponsored by Sangoma Technologies
WHITE PAPER: This exclusive white paper takes an in-depth look at a software solution for Asterisk based PBX systems. Read on to learn more.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Sangoma Technologies

Imaging and Printing: Is Your Valuable Data Protected?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Security Solutions for the Application Economy
sponsored by CA Technologies.
VIDEO: This video explores a leading solution for securing users's identities across all applications and devices.
Posted: 06 Nov 2014 | Premiered: 06 Nov 2014

CA Technologies.

Support Compliance and Continuously Monitor your Expanding Business
sponsored by LogRhythm, Inc.
CASE STUDY: Access this case study to get an insight into a financial security environment and finding a solution to detect potentially malicious activity.
Posted: 06 Nov 2014 | Published: 30 Sep 2014

LogRhythm, Inc.

Delivering Compliance, Security and Operations Intelligence
sponsored by LogRhythm, Inc.
CASE STUDY: This exclusive case study explores the security solution a theater went with to protect the information of its customers and employees.
Posted: 06 Nov 2014 | Published: 14 Sep 2014

LogRhythm, Inc.

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

The Role of Third-Party Applications in APT
sponsored by Lumension
WEBCAST: This valuable webcast explores how criminals are using advanced persistent threats to penetrate organizations defenses for weeks at a time.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Lessons Learned from the Target Data Breach
sponsored by Lumension
WEBCAST: This exclusive webcast explores key lessons learned from the high-profile security breaches in 2013.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Redefining your Security Vision
sponsored by ComputerWeekly.com
RESOURCE: Despite its undisputed dominance of the security market recently, Symantec's revenues have remained static. Will the expansion of its enterprise data security, cloud and mobile portfolio return it to growth? Take our brief survey and you'll gain immediate access to a ComputerWeekly eguide, Building momentum: Symantec's new approach to security.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

ComputerWeekly.com
76 - 100 of 2936 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement