IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
1 - 25 of 2780 Matches Previous Page  |  Next Page
Saint-Gobain group reduces expected branch server investment by 97% with Nomad
sponsored by 1e Inc
WHITE PAPER: Saint-Gobain Group, the world leader in the habitat and construction markets, needed to reduce their expected branch server investment. They turned to a streamlined systems management platform. Read this white paper to find out which systems management platform enables Saint-Gobain to make significant cost savings
Posted: 04 Mar 2015 | Published: 04 Mar 2015

1e Inc

Workforce Management System: Formet Industries Case Study
sponsored by Workforce Software
WHITE PAPER: Formet Industries, one of the largest highly automated manufacturing facilities in North America, dealt with frustration when changing any policy in their payroll and benefits system. Formet searched for a system that would stop an error before payroll processing. Read this white paper to find out which workforce management system Formet chose.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

Workforce Software

Realize the Serious Economic Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: View this informative report to learn how detrimental APTs can be for your organization, particularly pertaining to your finances.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

MobileIron Content Security Service Datasheet
sponsored by MobileIron
DATA SHEET: This exclusive datasheet offers a look at a content security service that can make any enterprise mobile-first. Read on to learn more.
Posted: 03 Mar 2015 | Published: 03 Mar 2015

MobileIron

Introducing Amazon RDS for Aurora
sponsored by Global Knowledge
WHITE PAPER: Discover how the enhanced performance and reliability of Amazon Aurora will help AWS customers reduce performance bottlenecks in their applications. The relatively low cost of Aurora will tempt many customers to migrate workloads to this implementation of RDS.
Posted: 03 Mar 2015 | Published: 27 Feb 2015

Global Knowledge

Best Practices for Creating the Network-Enabled Cloud
sponsored by XO Communications
WHITE PAPER: Access this white paper to discover a step-by-step guide to help improve your network to handle services delivered from multiple clouds.
Posted: 02 Mar 2015 | Published: 31 Dec 2014

XO Communications

Tolly Test Report: Web Application and  Security Access Manager Appliance
sponsored by IBM
WHITE PAPER: Access this white paper that details a test report of a web security and access manger appliance. Read on to learn how this appliance scored, and find out about the benefits it can provide your company.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

IBM

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

The Four Key Elements of Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.
Posted: 02 Mar 2015 | Published: 31 Aug 2014

IBM

NetApp Multi-Cloud Private Storage- Take charge of Your Cloud Data
sponsored by NetApp
WHITE PAPER: Access this white paper to discover the emergence of new hybrid architectures that give IT organizations the same enterprise-class security, data protection, and performance they have built on-premises combined with the flexibility and cost efficiencies of the public cloud.
Posted: 02 Mar 2015 | Published: 30 Sep 2014

NetApp

Test Results for 5 Security Systems
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report summarizes tests conducted on five different security programs, revealing which ones caught the most threats, had the best usability, and more.
Posted: 02 Mar 2015 | Published: 18 Nov 2014

Check Point Software Technologies Ltd.

The Latest Trends Surrounding Collaboration in the Workplace
sponsored by Premiere Conferencing
WHITE PAPER: Access this white paper that highlights trends and technologies that are powering business collaboration in 2015.
Posted: 02 Mar 2015 | Published: 02 Mar 2015


Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

March Information Security – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

SearchSecurity.com

Achieving Cloud Superiority: The Benefits of Advisory Services
sponsored by Tangoe
EBOOK: Access this white paper to learn how you can choose the perfect cloud solution for your enterprise with help from an advisory service.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

Tangoe

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com provides attendees with strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 27 Feb 2015 | Premieres: Apr 15, 2015, 08:15 EDT (12:15 GMT)

SearchSecurity.com

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

Instill Better Collaboration Practices Into Your Business
sponsored by XO Communications
WHITE PAPER: View this white paper to learn why deploying a hosted PBX service is more advantageous than sticking with your traditional, premier-based PBX.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

XO Communications

Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

Buyer's Essential: What to Look for In Threat Intelligence Services
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from the adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

How Desktop-as-a-Service Can Solve Higher Education’s End-User Computing Challenges
sponsored by VMware
WHITE PAPER: Access this informative white paper to discover how desktop-as-a-service builds on virtual desktop computing but takes it a step further moving it to the cloud. Explore eleven benefits of DaaS and how this technology is built for higher education.
Posted: 27 Feb 2015 | Published: 28 Nov 2014

VMware

The Cloud Pillars: Five Foundational Building Blocks for Apps in the Cloud
sponsored by Rackspace
WHITE PAPER: This white paper explains the five pillars associated with cloud applications.
Posted: 27 Feb 2015 | Published: 13 Nov 2014

Rackspace

Mitigating Risk with Security Intelligence and Identity Assurance
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an integrative approach that lets companies quickly identify abnormalities in user behavior, as well as fighting insider threats all while complying with regulations.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation
1 - 25 of 2780 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement