IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
126 - 150 of 1632 Matches Previous Page  |  Next Page
Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: This white paper reveals the benefits of hardware encryption for strengthening data security across the enterprise while freeing up IT to take on other important data center tasks.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Micron Technology

Advance Your Cybersecurity Career with Unique Online Cybersecurity Graduate Program
sponsored by Mission Critical Institute
WHITE PAPER: This resource introduces the expert faculty in the online cybersecurity MBA program offered through Concordia St. Paul. Take a look to determine if these staff members could help you reach your further education goals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Mission Critical Institute

Overcome Three of Today's Biggest End User Pain Points
sponsored by Dell and Microsoft
WHITE PAPER: This resource reveals 3 of the most critical IT challenges centered around end users today, providing tips on addressing these pain points without spending too much time or money doing so.
Posted: 23 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft

5 Ways to Mobilize Windows Apps
sponsored by Citrix
WHITE PAPER: Learn how to boost employee productivity with Windows apps on demand. Meet the needs of today's modern workforce and empower your users with on-demand self-service to your enterprise apps.
Posted: 22 Jun 2015 | Published: 31 Jan 2014

Citrix

Corporate Data: A Protected Asset or a Ticking Time Bomb?
sponsored by Varonis
WHITE PAPER: Access this white paper for in-depth research into the growing risks and challenges to productivity that data growth and a lack of internal controls currently present for organizations of all sizes.
Posted: 19 Jun 2015 | Published: 31 Dec 2014

Varonis

Obtain an MBA in Cybersecurity: Curriculum Overview
sponsored by Mission Critical Institute
WHITE PAPER: Employers are clamoring for job-ready cybersecurity professionals, specifically cyber pros who can apply the NIST Risk Management Framework to help protect their systems. Take a look at these online course offerings from Concordia University St. Paul to learn how you can become one of those much-needed security professionals.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

Mission Critical Institute

Gartner Market Guide for File Analysis Software
sponsored by Symantec | Veritas
WHITE PAPER: File analysis (FA) enables better information management decisions for unstructured data. Access this market guide for File Analysis software to read about use cases, recommendations, and vendor comparisons.
Posted: 18 Jun 2015 | Published: 23 Sep 2014

Symantec | Veritas

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 18 Jun 2015 | Published: 01 Jan 2015

NetApp

Your BT Agenda Demands A Hybrid Cloud Storage Strategy
sponsored by NetApp
WHITE PAPER: In this informative report issued by Forrester, discover how to launch a hybrid cloud storage strategy with greater payoff. Read on and uncover why current storage environments are limited, how to raise your infrastructure to the next level, and learn how to make your transition to hybrid cloud storage smooth and effective.
Posted: 18 Jun 2015 | Published: 08 Jan 2015

NetApp

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

NetApp

An Introduction to AWS Security
sponsored by Global Knowledge
WHITE PAPER: This white paper explains the most important aspects of AWS security and what that means to the enterprise.
Posted: 17 Jun 2015 | Published: 05 May 2015

Global Knowledge

The Internet of Things: A Primer for the Curious
sponsored by Global Knowledge
WHITE PAPER: View this white paper to learn what the Internet of Things means, some key vertical markets where it can affect the most short-term change, the impact on existing networks, and much more.
Posted: 17 Jun 2015 | Published: 08 Apr 2014

Global Knowledge

Information Governance: Fighting Back Against the Exponential Data Curve
sponsored by Symantec | Veritas
WHITE PAPER: This white paper focuses on information governance, specifically fighting back against the exponential data growth we are facing.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Symantec | Veritas

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Disrupting the Enterprise: Why Outlook No Longer Makes Sense
sponsored by Cloud Sherpas
WHITE PAPER: Access this white paper to find out if Microsoft Outlook is evolving to keep up with the BYOD revolution and whether it meets the needs of the business when it comes to performance, security and cost.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Cloud Sherpas

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

Access the Intercloud: Cloud the Way You Want It
sponsored by Cisco
WHITE PAPER: View this white paper to learn more about a globally connected network of clouds that deliver the secure cloud services you need everywhere in the world.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Cisco

The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

Accelerate How You Innovate
sponsored by Dimension Data
WHITE PAPER: In this report, learn from several executives and technology experts about the key challenges they are facing with data centers in the era of the cloud.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Dimension Data

Microsoft Collaboration and Productivity Apps: A Dedicated Private Cloud for Your Microsoft Application
sponsored by Rackspace
WHITE PAPER: Read this white paper to find out why a dedicated private cloud is the best environment to run your Microsoft collaboration and productivity apps.
Posted: 08 Jun 2015 | Published: 18 May 2015

Rackspace

An E-Guide to Online Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines several ways to develop and implement long-term security strategies to proactively defend against evolving security risks. Access now and learn what it takes to beef up your online security quick and efficiently.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Melbourne IT

Risk-Free VDI with Tintri and Citrix
sponsored by Tintri
WHITE PAPER: Many IT organizations are turning to virtual desktop infrastructure (VDI) technology to reduce the cost, complexity, and risk associated with desktop management. Access this white paper to find out how to gain end-to-end insights into the storage infrastructure for unmatched VM control. Learn how to you make your VDI successful.
Posted: 05 Jun 2015 | Published: 07 Jul 2014

Tintri

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
126 - 150 of 1632 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement