IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
101 - 125 of 2924 Matches Previous Page  | Next Page
IDC White Paper: EMC Isilon Scale-Out Data Lake Foundation
sponsored by EMC Isilon
WHITE PAPER: Read this whitepaper to find out which capabilities are essential for building a Big Data infrastructure.
Posted: 02 Dec 2014 | Published: 31 Oct 2014

EMC Isilon

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Security and Compliance for Scale-Out Hadoop Data Lakes
sponsored by EMC Isilon
WHITE PAPER: This whitepaper explains in detail how this scale-out NAS storage system provides a multiprotocol data lake that secure Hadoop data.
Posted: 02 Dec 2014 | Published: 31 Aug 2014

EMC Isilon

How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE: This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

TaaSera

SIEM Missteps? Tips to Help You Move Forward
sponsored by LogRhythm, Inc.
PODCAST: Download this expert podcast now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 02 Dec 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: This informative resource from Gartner compares mobile data protection solutions from a number of reputable companies, which defend access to secure data on storage systems in notebooks, removable media, desktops, and servers.
Posted: 02 Dec 2014 | Published: 08 Sep 2014

Digital Guardian

Top Tips for managing a REMOTE workforce
sponsored by ControlNow
WHITE PAPER: Read this whitepaper to find out how to set a cloud policy that provides security for your remote and mobile devices.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

ControlNow

IT and Executive Perspective on ITaaS
sponsored by EMC
WHITE PAPER: This white paper details a survey that compares two competing perspectives on various IT topics.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

EMC

Information Security Magazine: December 2014
sponsored by SearchSecurity.com
EZINE: The winners of Information Security magazine's Security 7 awards are announced. The Security 7 awards honor CISOs, security researchers and others at the top of their profession.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

SearchSecurity.com

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Cost of a Breach Rising; How to Protect Against It
sponsored by TaaSera
EGUIDE: This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

TaaSera

Cloud Computing Security Up Close
sponsored by CDW Corporation
WHITE PAPER: Making practical and strategic decisions is the only effective way to secure your data in the cloud. Access this expert resource to get details on a variety of topics surrounding cloud security including protecting sensitive data, maintaining regulatory compliance, keeping track of data location and segregation, and more.
Posted: 01 Dec 2014 | Published: 26 Nov 2014

CDW Corporation

Security Best Practices for a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: This white paper presents a straightforward approach to cloud security that enables your enterprise to mitigate the risks associated with cloud deployment and usage; improve and standardize your security posture and practices across all environments; and more.
Posted: 01 Dec 2014 | Published: 31 Jul 2014

IBM

Getting IT Security Wrong Can Be Costly—How to Balance Investment with Risk
sponsored by Clearswift
WHITE PAPER: This white paper examines why so many executives take little interest in information security; why compliance needs to be combined with a more risk-based approach to security; the importance of creating a security-aware culture; and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Clearswift

Rethinking Data Discovery and Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses data discovery and classification, two essential but often overlooked initiatives that lay the foundation for protecting data. Read on to access a three-part framework for data security and control, created by Forrester to help S&R professionals adapt to the new data economy.
Posted: 26 Nov 2014 | Published: 01 Oct 2014

Digital Guardian

NSS Labs Comparative Analysis - Security Value Map
sponsored by Citrix
WHITE PAPER: Access this white paper to get a clear cut view of various web application firewalls, and learn how they stack up against one another.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Citrix

Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

Security Experts’ Guide to the Cloud
sponsored by ControlNow
WHITE PAPER: Cloud computing delivers a number of benefits, but it's security has always been an issue. Access this resource, tech influencers share their views on security and the cloud and give advice on how to marry the cloud and security into your business.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

ControlNow

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Identity and Access Intelligence: How Big Data and Risk Analytics Will Revolutionize IAM
sponsored by Courion Corporation
WHITE PAPER: This white paper discusses the shortcoming of today's IAM systems and gives an overview of Identity and Access Intelligence Systems.
Posted: 25 Nov 2014 | Published: 30 Sep 2013

Courion Corporation

Best Practices in Desktop Virtualization
sponsored by Dell
WHITE PAPER: Access this white paper to discover everything you need to know about client virtualization to help you determine which approach to client virtualization makes the most sense for your organization.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Dell

Addressing Changes in the Healthcare IT Legislative and Regulatory Environment
sponsored by Dell
WHITE PAPER: Access this white paper to discover how cloud client computing solutions supported by VDI provide a flexible, integrated, and virtualized IT environment to tackle the challenges faced by healthcare providers.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Dell

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
101 - 125 of 2924 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement