IT Management  >   Systems Operations  >  


RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by, powered by an online computer dictionary
Security Reports
1 - 25 of 3373 Matches Previous Page  |  Next Page
CEO Disconnect Is Weakening Cybersecurity
sponsored by Centrify Corporation
RESEARCH CONTENT: As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. This resource offers insights into senior-level thinking on the issue of cybersecurity, including current security priorities and the perceived degree of alignment between threats and solutions.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

How to Prepare for GDPR
sponsored by AlienVault
WEBCAST: The GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. Take a look at this webcast to uncover a compliance and unified security management approach to prepare for the GDPR.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018


A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: There are 6 scenarios where you and your customers are prone to fraud. In this white paper, discover these common scenarios and learn how a fraud detection platform can identify risks within your organization.
Posted: 17 Apr 2018 | Published: 17 Apr 2018


Eight Components of a Successful BYOD Strategy
sponsored by MobileIron
WHITE PAPER: Download this resource to discover a UEM platform that enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy.
Posted: 16 Apr 2018 | Published: 16 Apr 2018


UEM Deployment Best Practices
sponsored by MobileIron
WHITE PAPER: Download this PDF now to find out the four steps to successfully deploying a UEM platform and learn how you can enable your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while maintaining security.
Posted: 16 Apr 2018 | Published: 16 Apr 2018


SD-WAN Adoption is Accelerating to Reduce Security Risk
sponsored by Versa Networks
RESEARCH CONTENT: In this research report, gain valuable insights into how companies manage and secure their network across branch locations. Also, find out the expected benefits and challenges of SD-WAN.
Posted: 13 Apr 2018 | Published: 31 Dec 2017

Versa Networks

sponsored by Sage Software
RESOURCE: By their very nature, HR teams are key custodians of personal data that companies hold about their employees, starting with a person exploring job opportunities as a candidate. Tap into this 6-step guide for HR teams to prepare for GDPR.
Posted: 11 Apr 2018 | Published: 11 Apr 2018

Sage Software

The EU General Data Protection Regulation
sponsored by Oracle Cloud
WEBCAST: The General Data Protection Regulation (GDPR) gets a lot of buzz for what it will do for data privacy – but how much do you really know about what it means? Download this webcast to learn more about different aspects of GDPR, and discover how businesses can approach getting compliant.
Posted: 10 Apr 2018 | Premiered: Apr 6, 2018

Oracle Cloud

How to Create a Scalable & Sustainable Vendor Risk Management Program
sponsored by BitSight
WHITE PAPER: Massive cyberattacks are routinely attributed to vendors with substandard security practices. This resource offers a detailed 6-step guide for creating a sustainable and scalable vendor risk management program from the ground up.
Posted: 09 Apr 2018 | Published: 09 Apr 2018


Contractor Cyber Risk Continues to Grow
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Access this resource to learn 3 strategies to mitigate risk when hiring an outside contractor for your networking needs.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

The Insider's Guide to Cybersecurity For Government
sponsored by Microsoft
WHITE PAPER: The Insider's Guide to Cybersecurity for Government is your best practices path to confidence across the cloud and devices. Dive in to learn what your organization can expect from the latest cybersecurity technology and dedication of a leading cloud-based partner.
Posted: 09 Apr 2018 | Published: 09 Apr 2018


Empower Employees with the Digital Workspace
sponsored by Data#3
WEBCAST: Watch this brief video to learn about a digital workspace that allows IT to securely deliver any app from any cloud to any device.
Posted: 05 Apr 2018 | Premiered: Mar 21, 2018


Securing MacOS in the Modern Work Era
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover a UEM platform for Mac devices that doesn't require integrations or additional training, and is seamless for end users, improves operational efficiency, and simplifies IT operations across the device lifecycle.
Posted: 05 Apr 2018 | Published: 05 Apr 2018


How to Protect Your Multi-Cloud Environment With One Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Multi-cloud networks present attack surfaces that are significantly larger, more distributed, and more variable than those of enterprise networks or single clouds. Leverage this resource to learn how to protect your multi-cloud environment with a broad, integrated, and automated framework for network security.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Fortinet, Inc.

Shoring Up the Weak Link in Phishing Defenses: Your People
sponsored by Veeam Software
WHITE PAPER: Because phishing is happening all of the time, to every organization, security pros need to understand where the next attack is going to come from in order to be better prepared. Explore this expert resource to learn how to secure the weakest link of your phishing defense: your people.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Veeam Software

Addressing User Data Risks in a Distributed Data World
sponsored by Druva Software
RESOURCE: With the EU's GDPR regulations ready to strike with stiff penalties for violators, businesses need a data governance policy that can keep them safe. Download this resource to discover a new approach to data governance.
Posted: 04 Apr 2018 | Published: 31 Dec 2016

Druva Software

A Guide to PCI Compliance in Containers
sponsored by Sysdig
WHITE PAPER: Containers have been adopted faster than any previous enterprise technology and with this quick rise in adoption, maintaining compliance can be difficult. This resource offers insight into PCI DSS compliance within containers.
Posted: 04 Apr 2018 | Published: 04 Apr 2018


Web Application Firewall (WAF) Security Value Map
sponsored by Citrix
WHITE PAPER: This resource shines light into an independent test and provides detailed information about Citrix's web application firewall product, including its security effectiveness, performance, and TCO.
Posted: 04 Apr 2018 | Published: 04 Apr 2018


Technical Considerations for Mobility in the Enterprise
sponsored by Data#3
WHITE PAPER: Download this guide to help move your mobility discussion beyond just users and devices to take you through all the levels you need to consider for a more technical mobility strategy focused on workspace services and delivery.
Posted: 04 Apr 2018 | Published: 04 Apr 2018


Ransomware: Everything you Need to Know
sponsored by Cisco & Dimension Data
WHITE PAPER: According to Cisco, a typical ransom can be anywhere from $200 to $10,000, but some institutions have paid a far higher price. Access this resource to uncover everything you need to know about ransomware and protecting your enterprise.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

IDC Infobrief: How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
sponsored by Citrix
RESOURCE: 79% of worldwide organizations plan to address application disruption via a unified application-delivery strategy. As multi-cloud environments become more common organizations struggle to secure and manage applications across multiple locations. Read on to see how a unified application delivery strategy can help solve these challenges.
Posted: 02 Apr 2018 | Published: 31 Oct 2017


Seeing the Future is the Future of Cybersecurity
sponsored by Sophos
WEBCAST: In an effort to augment security, many vendors are looking toward transitioning from a reactive approach to a more predictive approach. Take a look at this webcast to gain insight into the future of cybersecurity and how your enterprise can better predict attacks to intercept them before they wreak havoc on your enterprise.
Posted: 02 Apr 2018 | Premiered: Apr 2, 2018


Testing Endpoint Security: An Introductory Guide
sponsored by Sophos
WHITE PAPER: In this 25-page white paper, explore how to successfully test endpoint security software. Find out how testing a wide range of features in multiple scenarios is the best way to have clarity on how effective an endpoint security product can be against the advances that attackers have made in recent years.
Posted: 02 Apr 2018 | Published: 02 Apr 2018


Webinar: How to Migrate Sensitive Records to AWS
sponsored by AWS - Logicworks
WEBCAST: Migrating sensitive data to the cloud is becoming unavoidable. You'll want to make sure it's done securely, especially with GDPR's stiff financial penalties looming. Register for this webinar taking place on May 1, 2018 to learn how to migrate sensitive data to Amazon Web Services (AWS).
Posted: 30 Mar 2018 | Premiered: Mar 30, 2018

AWS - Logicworks

Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)
sponsored by NSS Labs
WEBCAST: How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs
1 - 25 of 3373 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement