IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
76 - 100 of 1649 Matches Previous Page  |  Next Page
Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

FlexPod Datacenter with Microsoft Private Cloud
sponsored by Cisco Systems, Inc.
WHITE PAPER: View this white paper to learn about a private cloud solution that is designed for deploying Cisco® and NetApp technologies as a shared cloud infrastructure that has been validated under the Microsoft Private Cloud Fast Track v4 program.
Posted: 03 Jun 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Enabling enterprise data access on mobile devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn about a secure mobile productivity suite that increases employee access to enterprise data and applications without compromising security, employee privacy, or the personal user experience on the device.
Posted: 03 Jun 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

Awareness and Protection Help Prevent Phishing and Spoofing in Email Marketing
sponsored by Neustar®
WHITE PAPER: Access this resource to see how to block fraudulent emails to your customers. Continue reading learn how to see who is sending emails from your organization and how to block emails coming from unauthorized users.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Neustar®

Why Should You Consider BYOD?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn what it takes to build a successful BYOD strategy.
Posted: 02 Jun 2015 | Published: 30 Jun 2014

Dell, Inc. and Intel®

Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Cisco

Is a secure workspace approach right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: View this white paper to find out whether taking a secure workspace approach is the right way to go.
Posted: 01 Jun 2015 | Published: 01 Jul 2014

Dell, Inc. and Intel®

Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Hewlett-Packard Company

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is rapidly changing the role of IT. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 01 Jun 2015 | Published: 31 Jan 2015

Cisco

10 IPS Platforms Reviewed and Compared
sponsored by IBM
WHITE PAPER: This report examines ten different IPS platforms and reviews them based on block rate, anti-evasion capabilities and more.
Posted: 01 Jun 2015 | Published: 31 Dec 2013

IBM

At-a-Glance: How CIOs are Responding to End-User Computing Complexity
sponsored by VMware
WHITE PAPER: This white paper highlights the top five desktop and mobile computing challenges faced by IT pros within their organizations. Discover seven approaches that CIOs are embracing to cope with these end-user computing management challenges.
Posted: 01 Jun 2015 | Published: 31 Dec 2014

VMware

The 5 Essential Functions of an Enterprise Security Operations Center
sponsored by IBM
WHITE PAPER: This infographic describes the five ways a dedicated security operations center can help you develop smarter and more efficient responses to threats.
Posted: 29 May 2015 | Published: 29 May 2015

IBM

Managing Expanding Endpoint Environment: A Survey of IT Professionals
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This report is based on a survey of 723 IT professionals. The goal was to understand the current types of endpoints connecting to corporate networks, what is coming, and what challenges they are creating for systems management. Click through now to explore several detailed findings.
Posted: 29 May 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 29 May 2015 | Published: 29 May 2015

Hewlett-Packard Company

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Government -OpenLegacy replaces old HTML emulation solution at the Israel Airport Authority with a modern web application
sponsored by Open Legacy
WHITE PAPER: Access this white paper to find out how IAA's engineers developed a dedicated mobile application to handle all aspects of security personnel management, including shift planning and assignment.
Posted: 29 May 2015 | Published: 31 Jan 2015

Open Legacy
76 - 100 of 1649 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement