IT Management  >   Systems Operations  >  


RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by, powered by an online computer dictionary
Security Reports
26 - 50 of 3371 Matches Previous Page  |  Next Page
Demystifying the myths of public cloud computing
sponsored by
RESEARCH CONTENT: In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
Posted: 27 Mar 2018 | Published: 27 Mar 2018

Mobile Security Innovation
sponsored by MobileIron
WHITE PAPER: Download this white paper to see how a highly secure mobile and cloud strategy can provide the in-depth focus and expertise to deliver a highly productive user experience, innovation and scalability.
Posted: 26 Mar 2018 | Published: 26 Mar 2018


Infosec culture: A former helicopter pilot's perspective
sponsored by
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

Secure Data Acquisition, Communication and Processing for Your IoT Solutions
sponsored by Telit
WHITE PAPER: This white paper explores the 3 pillars of IoT network security and offers advice on how you can overcome the impending cybersecurity threats while maintaining the agility you need to gain a competitive advantage.
Posted: 23 Mar 2018 | Published: 23 Mar 2018


The Ultimate Guide to BYOD
sponsored by MobileIron
WHITE PAPER: The ultimate challenge of any BYOD program is not just managing data security or optimizing end-user productivity. It's maintaining a constant balance between security, compliance, legal liability, cost concerns and a positive user experience. Download this guide for 8 key areas to focus to ensure a successful mobile strategy in your organization.
Posted: 23 Mar 2018 | Published: 23 Mar 2018


6 Steps for Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Working only to prevent and detect cyberattacks will not protect an enterprise against cybersecurity threats. Access this resource to uncover 3 challenges of building and managing a robust incident response program as well as 6 steps for overcoming these challenges and actually building a program.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

IBM Resilient

Global Threat Report
sponsored by MobileIron
WHITE PAPER: Mobile threats exist on many different levels across devices, networks and applications. Download this white paper to learn about some of the most recent mobile threats and how you can protect your organization.
Posted: 23 Mar 2018 | Published: 23 Mar 2018


Data Sheet: Clearpass Onboard
sponsored by Aruba Networks
RESOURCE: Mobile devices are changing how organizations approach network security protocols. In this resource, find out why organizations are switching to network policy management tools like Aruba ClearPass Onboard to help secure BYOD.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

Aruba Networks

Personal Data Protection: Enabling Compliance with GDPR
sponsored by SAS
RESOURCE: Protecting personal information and consumer integrity has become a high priority for the EU and a result, the GDPR was created. This resource outlines GDPR challenges, new compliance requirements, and 5 steps to evolve current data protection and compliance strategies.
Posted: 21 Mar 2018 | Published: 31 Dec 2016


Top Global Research Laboratory Resolves Security Incidents Faster
sponsored by IBM Resilient
CASE STUDY: To manage today's threats, organizations need a proven and robust incident response (IR) function. Explore this case study to gain insight into how a top global research laboratory overcame the issue of an inadequate IR ticketing system; it lacked flexibility, control, and security analytics.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

IBM Resilient

Protect Your Data at Every Point Possible
sponsored by Dell EMC and IntelĀ®
RESOURCE: The average annual cost of data loss is nearly $1 million, according to Dell EMC research. Take a look at this infographic to uncover how to protect your data at every point possible in the shifting IT landscape.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

Dell EMC and IntelĀ®

Assessing Cybersecurity Success
sponsored by ConvergeOne
WHITE PAPER: How does your organization measure success of cybersecurity? This resource offers a simple and clear way to review and assess your current information security program.
Posted: 20 Mar 2018 | Published: 20 Mar 2018


6 Steps to SIEM Success
sponsored by AlienVault
WHITE PAPER: How is your enterprise achieving SIEM success? Whether your goals are to detect threats, achieve compliance, or fuel incident response, this resource will help your SIEM strategy achieve success.
Posted: 20 Mar 2018 | Published: 20 Mar 2018


Incident Response Platform vs. Ticketing System: Why Security Teams Need Purpose Built Technology
sponsored by IBM Resilient
RESEARCH CONTENT: Cybersecurity incident response is imperative in this decade of constant attacks. This Gartner research report explores the differences between incident response platforms vs. ticketing systems and explains the risks and limitations of using a ticketing system for purposes beyond what it was built to do.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: How does your organization plan to respond to complex cyber threats? Learn how an incident response platform can significantly drive down the mean time to find, respond to, and remediate incidents.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

GDPR: What it Means and How to Get Compliant
sponsored by SAS
RESOURCE: GDPR will require an ongoing, organization-wide focus to ensure you protect your customers' personal data. Any organization that does not comply could be fined up to $22 million, or 4% of their global annual revenue (whichever is greater). Access this 5-step checklist to learn how to stay GDPR-compliant.
Posted: 19 Mar 2018 | Published: 31 Dec 2017


Why Many Cloud Communications Providers Don't Like to Talk About Security, Compliance and Reliability
sponsored by 8x8, Inc.
WHITE PAPER: Learn how security, compliance and reliability are just as important for business communication systems and 10 tough questions you should ask your communications provider today.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

8x8, Inc.

The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast, Enza Iannopollo, security & risk analyst at Forrester Research, demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

The Mobility Landscape: Goals and Challenges
sponsored by MicroStrategy Incorporated
WHITE PAPER: Download this white paper for an outline of the mobility landscape, businesses top goals for mobility initiatives, and how to minimize the challenges to mobility.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

MicroStrategy Incorporated

10 benefits of data mining and predictive analytics
sponsored by MicroStrategy Incorporated
ANALYST REPORT: Learn how you can extend the benefits of data science, machine learning, and predictive analytics, and the challenges that companies are facing with these plans.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

MicroStrategy Incorporated

Enabling Network Visibility and Dynamic Threat Migration
sponsored by Big Switch Networks
RESOURCE: In this technology overview, learn how a programmable SDN controller can help IT teams gain clear visibility into their network while addressing the challenges associated with traditional network security deployment options.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Big Switch Networks

10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

8 Point Mobility Checklist
sponsored by Fujitsu
RESOURCE: In today's digital-first world, mobile computing and modern communications are changing the way educational institutions operate. Securely integrating new devices into your existing mobility strategy can be difficult and time consuming. Download this 8 point checklist to ensure a successful mobility strategy for educators.
Posted: 12 Mar 2018 | Published: 12 Mar 2018


Empower and Protect Your Organization With an End-to-End Approach to IoT Security
sponsored by VMware Pulse
WHITE PAPER: McKinsey predicts the annual economic impact of the IoT could exceed $11 trillion by 2025. This white paper reveals an end-to-end approach to protecting your organization within the age of IoT.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

VMware Pulse
26 - 50 of 3371 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement