IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
26 - 50 of 1680 Matches Previous Page  |  Next Page
Windows Server 2003: Why You Should Get Current
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: Access this white paper to discover helpful tips on a successful Windows Server 2003 migration, including two migration options that are available to customers and how to develop a strategy for mitigating and modernizing existing Windows Server 2003 and related application installations.
Posted: 20 Mar 2015 | Published: 31 Jul 2014

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Ensuring Secure Mobility for Healthcare Organizations
sponsored by Insight
WHITE PAPER: Access this white paper to learn how to develop a comprehensive mobile security framework. Lock out potential cyber thieves and ensure users have easy, reliable and secure access to essential data and services through their mobile devices.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Insight

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

Compliance and Security for Healthcare Providers Driving Access and Efficiency through User Context
sponsored by RES Software
WHITE PAPER: This white paper describes software that helps you speed and personalize access to applications and services throughout the organization without sacrificing privacy, security, and compliance.
Posted: 19 Mar 2015 | Published: 08 Jan 2015

RES Software

How to Prevent the Most Common IAM Failures
sponsored by SailPoint Technologies
WHITE PAPER: In this in-depth resource, discover how management failures can cause unexpected IAM problems.
Posted: 19 Mar 2015 | Published: 08 Oct 2014

SailPoint Technologies

Five Steps For Securing The Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper presents five essential steps to securing your database without sacrificing the high performance of modern data centers.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Wyse vWorkspace Supports Higher Education'€™s Desktop Virtualization Needs
sponsored by Dell, Inc.
WHITE PAPER: Inside this white paper, discover a desktop virtualization and application delivery solution that provides a platform that is simple, scalable and flexible, and delivers enterprise-class performance. Find out how its broad feature set serves the needs of higher education.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Advanced Threat Protection
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

Workspace Modernization for Healthcare Delivering Flexibility, Performance and Stability
sponsored by RES Software
WHITE PAPER: This white paper highlights a technology that improves the virtual clinical workspace to better meet the needs of healthcare users and IT professionals. Find out how this technology is tackling the issues associated with performance, reliability and stability, and updates and learn how this is helping them to deliver high-quality patient care.
Posted: 18 Mar 2015 | Published: 09 Jan 2015

RES Software

Data Center Micro-Segmentation
sponsored by VMware
WHITE PAPER: Access this white paper to explore the security capabilities of an SDDC approach and the VMware NSX network virtualization platform.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

VMware

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Extend the Value of Desktop Virtualization A Guide to Scaling Citrix Environments Easily and Predictably
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This expert white paper explores the benefits of using HCIAs for desktop virtualization. Find out what to look for in an HCIA and learn about deploying the right HCIA for Citrix environments. Also, discover end-to-end solutions from Dell that ease deployment challenges and make desktop virtualization more scalable and predictable.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

How to Improve Your Threat Intelligence
sponsored by Threatstream
WHITE PAPER: This white paper discusses those problems and how threat intelligence is evolving to fix them.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Threatstream

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

Unified Communications Security Measures: Ensuring Peace of Mind
sponsored by ThinkingPhones
WHITE PAPER: This white paper discusses the essential security features all unified communications should have.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

A New Paradigm in Desktop Virtualization Delivering Rich Graphics Applications to Anyone
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to discover three architectural models for delivering rich graphics to virtual desktop environments. Find out how to deliver accelerated graphics for a variety of users and workloads and the benefits of using VDI for rich graphics.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to examine the three major categories of BYOD – laptops, tablets, and smartphones. Explore the benefits and risks associated with each of these categories and discover recommendations on how to successfully implement an approach in order to embrace BYOD in a way that makes sense for your organization.
Posted: 17 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

South Washington Co. Schools: redefining the network
sponsored by Hewlett-Packard Limited
WHITE PAPER: As a result of the exponential growth in wireless devices, South Washington County Schools needed an easier way to maintain security and manage both wired and wireless networks. Read this case study to learn more about the structure the school implemented to improve security.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Hewlett-Packard Limited

Dynamic Access Control: Beyond Classic NTFS Permissions
sponsored by Global Knowledge
WHITE PAPER: Read this white paper to learn how you can design security groups and folder hierarchies that let you control file system access the way you want with Dynamic Access Control.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Global Knowledge

Data Security and Privacy: Building Confidence in Big Data
sponsored by IBM
WHITE PAPER: In order to protect big data, you need to first understand big data. This white paper will help you do so.
Posted: 16 Mar 2015 | Published: 31 Oct 2012

IBM
26 - 50 of 1680 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement