IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
76 - 100 of 3090 Matches Previous Page  |  Next Page
How CAME Group Protects Endpoints from Targeted Cyber-Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Working with a trusted IT partner, CAME Group was able to deploy a security platform in their central data center and protect more than 1,600 endpoint devices. Discover ways you too can enable increased visibility and control of your network.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palo Alto Networks

Secure Access for Retail
sponsored by Fortinet, Inc.
RESOURCE: The wireless network must become a springboard to exploit new technologies without adding to the security risks. This resource highlights how the retail industry can offer Wi-Fi internet to their customers without fear of security failures.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

Industry Assessment: Key Findings on Effective Threat Protection
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.
Posted: 12 Aug 2016 | Published: 17 Mar 2016

Check Point Software Technologies Ltd.

Exposing the Unknown: How Sanboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. Read on to also explore the emerging role of sandboxing as a powerful weapon in cyber security.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Check Point Software Technologies Ltd.

A Stronger Silver Lining in the Cloud
sponsored by Palerra Inc.
WHITE PAPER: In this time-saving infographic, discover key figures on cloud usage among enterprises and IT professionals. Learn which services are being used, the true cost of a data breach, why security is lacking on the cloud, and what is being done about it.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

Understanding behavioural detection of antivirus
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

ComputerWeekly.com

How to Conquer the Biggest AWS Adoption Challenges
sponsored by Palerra Inc.
WHITE PAPER: Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

Solution Guide
sponsored by Fortinet, Inc.
RESOURCE: Learn the features of a tool which will work to secure your network, even as IT security becomes more complicated and vulnerable. By recognizing the danger presented by wireless networking, you can effectively prepare for the modern explosion of network connected wireless devices.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

Use Secure Cloud and Scalability to Revolutionize B2B Payments Market
sponsored by Armor
WHITE PAPER: Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Armor

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Secure Access for K-12 Education
sponsored by Fortinet, Inc.
RESOURCE: Learn how classrooms and networks with specific needs can benefit from secure wireless networking without excessive cost or loss of features. Access now to learn how you can support BYOD, guard against malicious attacks, malware and viruses, and completely control application usage.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Integrated Secure Access Deployment Guide
sponsored by Fortinet, Inc.
PRODUCT LITERATURE: This deployment guide shows how to unify the management of wired and wireless infrastructure and security on to one platform and negate the need for multiple separate appliances.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Cloud Access Security Brokers Fill Critical Enterprise Void
sponsored by Palerra Inc.
EGUIDE: In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Cloud Security Automation: Are We Up To The Task?
sponsored by Palerra Inc.
EGUIDE: In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

A Unified View for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Overcome the Limitations of Traditional Cloud Security for Office 365
sponsored by Palerra Inc.
WHITE PAPER: See how you can take a modern approach to securing your Office 365 data without the performance bottlenecks of traditional inline solutions. Uncover how your enterprise can increase visibility, improve threat detection, continuously monitor configuration and activities for compliance, as well as provide automated incident response and remediation.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Discover how the mobile threat landscape is changing as well as staying the same. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

Buff Up Your Web Apps
sponsored by SearchSecurity.com
EZINE: Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

SearchSecurity.com

How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE: In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Xively by LogMeIn

Infrastructure Secure Access Deployment Guide
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: Learn how you can deploy a secure, premises managed, wireless LAN system to protect your network. From the access layer to internal segmentation, you'll see how to dramatically improve the security of your wireless network.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Fortinet, Inc.

Insider Threat Spotlight Report
sponsored by Palerra Inc.
ANALYST REPORT: In this extensive report, discover a detailed breakdown of how insider threats to enterprise data are on the rise and tap into some of the best ways to mitigate this risk to business data. Learn key trends that create vectors of attack for insiders, what the top offenders look like, which assets are most at risk, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Spotlight on Insider Threats to Cloud Applications
sponsored by Palerra Inc.
WHITE PAPER: In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.
76 - 100 of 3090 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement