IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
101 - 125 of 2839 Matches Previous Page  |  Next Page
Survey Results: Endpoint Security in a Time of Uncertainty
sponsored by Malwarebytes Corporation
WHITE PAPER: In this survey report, find statistics on the most common endpoint security threats faced, what protections are being leveraged, and more.
Posted: 05 May 2015 | Published: 05 May 2015


The Perfect Storm of Data, Cloud, and the Internet of Things
sponsored by IBM
VIDEO: View this video to learn how the cloud, despite all its well-publicized benefits and shortcomings, has found a new use-case: in helping support the "internet of things."
Posted: 05 May 2015 | Premiered: 05 May 2015

IBM

Endpoint Security Must Get Better
sponsored by Trend Micro
WHITE PAPER: Access this white paper now to learn how unsatisfied IT leaders are simplifying endpoint security while improving protection against attacks and avoiding the costs of potential security incidents.
Posted: 05 May 2015 | Published: 05 May 2015

Trend Micro

Mobile App Security Through Containerization: Top 10 Considerations
sponsored by Good Technology
WHITE PAPER: In this white paper, you'll learn the 10 best reasons to adopt containerization as your new mobile app security strategy.
Posted: 04 May 2015 | Published: 25 Jul 2014

Good Technology

Dell Wyse thin client all-in-one 5212
sponsored by Dell, Inc.
DATA SHEET: Access this informative data sheet to discover an all-in-one thin client architecture, combining the power of a thin client operating system with a thin client desktop. Explore five industry use cases for this technology and learn how it delivers an excellent virtual desktop experience for users while simplifying management for IT.
Posted: 04 May 2015 | Published: 04 May 2015

Dell, Inc.

Mobile App Management: 10 Requirements From Real Customer Deployments
sponsored by Good Technology
WHITE PAPER: Access this white paper for the 10 essential factors of a strategic, long-term, transformational MAM program.
Posted: 04 May 2015 | Published: 25 Jul 2014

Good Technology

Big Data Analytics On Security Data
sponsored by Platfora
WHITE PAPER: Access this exclusive white paper to learn how big data analytics are playing a new role in security. Discover why data driven analytic tools are helping executives understand and prevent advanced cyber-attacks securing their organization's reputation and money.
Posted: 04 May 2015 | Published: 04 May 2015

Platfora

The Printer Playbook: Strategy and Insight for the Enterprise
sponsored by Hewlett-Packard Company
WHITE PAPER: This Printer Playbook explains why printer security should be part of your overall information technology strategy. It offers suggestions and resources to help businesses begin securing their networks.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

The Importance of Embedded Device Security
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this Red Tiger Security Paper, Printer and Embedded Device Security, and see where and how bad guys exploit print devices—and the measures you can take to stop them.
Posted: 04 May 2015 | Published: 07 Apr 2015

Hewlett-Packard Company

Self-Assessment: Discover if Your Printers are Insecure
sponsored by Hewlett-Packard Company
ASSESSMENT TOOL: Focus your print security strategy with the HP Secure Print Analysis tool. This quick assessment of your current print security infrastructure will tell you where to strengthen print security, using best practices in mobile print security, printer hard drive encryption, fleet management, and more.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Enabling The Secure And Rapid Adoption Of Cloud Services
sponsored by Microsoft
WHITE PAPER: Access the results of this Forrester report to discover what's driving the current trend towards adoption of cloud technology and why the benefits of cloud outweigh the potential security risks for many organizations. Read on to discover what your organization can do you address potential security risks in your cloud system.
Posted: 01 May 2015 | Published: 31 Oct 2013

Microsoft

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

Information Security Magazine – May 2015 Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015

SearchSecurity.com

Viruses in the Queue: IT Pros Share Their Experiences Combating Printer Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, hear firsthand experience from three different IT pros who found out the hard way about document and network security—it only takes one unprotected printer to create major, long-lasting headaches.
Posted: 01 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

How SMBs Can Advance their Security Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: In this analyst Q&A, Raymond Boggs, Vice President, Small/Medium Business Research, IDC, shares his insights and advice on behalf of firms looking to refine their security practices for maximum effectiveness.
Posted: 01 May 2015 | Published: 31 Mar 2015

Hewlett-Packard Company

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks

5 Traps to Avoid in your 2015 Mobile App Program
sponsored by Good Technology
WHITE PAPER: Access this white paper now to learn the 5 traps you absolutely must avoid if you want a successful mobile app program.
Posted: 01 May 2015 | Published: 30 Jan 2015

Good Technology

Anti-Exploit Tools: The Next Wave of Enterprise Security
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them.
Posted: 01 May 2015 | Published: 01 May 2015


Dell Data Protection Infographic
sponsored by Dell, Inc. and Intel®
DATA SHEET: This infographic details how Dell technology allows you keep systems and data protected, even for those systems that are missing. Learn how it continuously monitors the security state of all systems and how if a system detects an attempted attack, encryption keys can be automatically destroyed so your information can't be stolen.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

LifeCellar and Rackspace
sponsored by Rackspace
VIDEO: This video explains how Lifecellar was able to deploy a new hybrid cloud infrastructure that managed data efficiently while addressing security and privacy.
Posted: 30 Apr 2015 | Premiered: 30 Apr 2015

Rackspace

Optimal care for patients and their data
sponsored by Dell, Inc. and Intel®
CASE STUDY: Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.
Posted: 30 Apr 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Track and Analyze the Impact of Mobile Apps, Platforms and Device Preferences
sponsored by Good Technology
WHITE PAPER: Access this white paper now to discover all of the latest mobile trends and learn why security is quickly becoming the greatest concern for decision makers.
Posted: 30 Apr 2015 | Published: 27 Feb 2015

Good Technology
101 - 125 of 2839 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement