IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
51 - 75 of 1631 Matches Previous Page  |  Next Page
Balancing Security and User Experience: A Day in the Life of the Mobile Worker
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how to balance IT's difficulties with managing mobile security and the need to deliver a seamless mobile user experience.
Posted: 10 Jun 2015 | Published: 29 Aug 2014

Pulse Secure

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

Access the Intercloud: Cloud the Way You Want It
sponsored by Cisco
WHITE PAPER: View this white paper to learn more about a globally connected network of clouds that deliver the secure cloud services you need everywhere in the world.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Cisco

The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

Enterprise Plans for Mobile Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how your competition is embracing mobile security and discover key trends that will keep your company data safe for mobile business.
Posted: 08 Jun 2015 | Published: 26 Dec 2014

Pulse Secure

Accelerate how you Innovate
sponsored by Dimension Data
WHITE PAPER: In this report, learn from several executives and technology experts about the key challenges they are facing with data centers in the era of the cloud.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Dimension Data

An E-Guide to Online Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines several ways to develop and implement long-term security strategies to proactively defend against evolving security risks. Access now and learn what it takes to beef up your online security quick and efficiently.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Melbourne IT

Risk-Free VDI with Tintri and Citrix
sponsored by Tintri
WHITE PAPER: Many IT organizations are turning to virtual desktop infrastructure (VDI) technology to reduce the cost, complexity, and risk associated with desktop management. Access this white paper to find out how to gain end-to-end insights into the storage infrastructure for unmatched VM control. Learn how to you make your VDI successful.
Posted: 05 Jun 2015 | Published: 07 Jul 2014

Tintri

Infographic: 7 Ways SteelFusion is Like Your SmartPhone
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to discover 7 ways this all-in-one device is just like your smartphone.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Riverbed Technology, Inc.

Optimizing the Mobile Workforce
sponsored by Calero Software
WHITE PAPER: Read this white paper to learn how you can find the right balance of policy, plans, enforcement, support and user experience necessary for successfully optimizing the mobile workforce.
Posted: 05 Jun 2015 | Published: 26 Dec 2014

Calero Software

Fighting a Security Epidemic
sponsored by Hewlett-Packard Company
WHITE PAPER: Breaches are growing in number—and are difficult to detect. Learn how to make sure you aren't part of the epidemic.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

TOPICS:  Security
Hewlett-Packard Company

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

FlexPod Datacenter with Microsoft Private Cloud
sponsored by Cisco Systems, Inc.
WHITE PAPER: View this white paper to learn about a private cloud solution that is designed for deploying Cisco® and NetApp technologies as a shared cloud infrastructure that has been validated under the Microsoft Private Cloud Fast Track v4 program.
Posted: 03 Jun 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Enabling enterprise data access on mobile devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn about a secure mobile productivity suite that increases employee access to enterprise data and applications without compromising security, employee privacy, or the personal user experience on the device.
Posted: 03 Jun 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®
51 - 75 of 1631 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement