IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
101 - 125 of 2733 Matches Previous Page  |  Next Page
Creating a successful road map for cloud deployment
sponsored by IBM
WHITE PAPER: View this informative resource to access critical steps needed on the journey to meet your business needs and long-term career goals.
Posted: 05 Jan 2015 | Published: 01 Nov 2014

IBM

CW Europe – January 2015
sponsored by ComputerWeekly.com
EZINE: As we start another new year, we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

The Global State of Enterprise Mobility 2014/15
sponsored by ComputerWeekly.com
RESEARCH CONTENT: An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

Six Areas Where Citrix XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, explore an application virtualization strategy that includes the capabilities organizations need for full mobile productivity and how any strategy you choose should take into consideration the end-user and IT.
Posted: 02 Jan 2015 | Published: 28 Nov 2014

Citrix

Citrix NetScaler- A Foundation for Next-Generation Datacenter Security
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at traditional security concerns, plus a look at new security models that are paving the way today. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Citrix

Securing the Modern Data Center: Building Proper Security Controls, Policies, and Processes to Address and Mitigate New Risks
sponsored by Cisco
WHITE PAPER: This paper reviews three data center trends and their risks.
Posted: 31 Dec 2014 | Published: 19 Nov 2014

Cisco

Move on From your Ineffective Static Security Approach
sponsored by Cisco
WHITE PAPER: In this paper, learn how Cisco FireSIGHT® Management Center (Management Center) supports the Cisco®suite of anti-malware, intrusion prevention system (IPS), and next-generation firewall security products.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco

3 Essential Aspects of an Integrated Threat Defense Strategy
sponsored by Sourcefire
WHITE PAPER: This exclusive infographic explores the three key aspects of creating an integrated threat defense strategy that gives you the visibility to discover and protect against socially engineered exploits.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Sourcefire

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: This important white paper explores a security solution that spans the entire attack continuum.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco

Jump Start Mobile Productivity with MDM and Secure File Sharing
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at the importance of a solid MDM strategy, and how your organization reap the benefits of mobility with such. Read on to learn more.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

What to Look for in an Advanced Malware Protection Vendor
sponsored by Cisco
WHITE PAPER: This exclusive white paper explores the capabilities you must look for in your advanced malware protection vendor.
Posted: 31 Dec 2014 | Published: 26 Nov 2014

Cisco

Get the Most from Your EMM Deployment with Secure File Sharing
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how safe file delivery and access to mission critical data becomes key security issue for mobile devices. Read on to learn more.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Citrix

Addressing IT Data Challenges in Today's Mobile World
sponsored by CommVault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

CommVault

Reinventing WAN Architecture for Cloud Services
sponsored by VeloCloud
EGUIDE: This expert e-guide discusses the need for a new cloud WAN architecture and reveals a cloud WAN service that hybridizes MPLS and broadband links.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

VeloCloud

Delivering Enterprise Information Securely on Android, Apple iOS and Microsoft Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how IT security has changed with the introduction of consumerization and BYOD in the enterprise. Read on to learn more.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Citrix

Five Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce
sponsored by Citrix
WHITE PAPER: Access this white paper to explore a comprehensive app and desktop virtualization solution that depending on their key business priorities, will deliver the right kind of virtual desktop experience to each user. Discover use cases that help to address important business priorities.
Posted: 29 Dec 2014 | Published: 31 Oct 2013

Citrix

The Cisco 2014 Midyear Security Report Identifying the Weak Links
sponsored by Sourcefire
WHITE PAPER: Download this extensive white paper now to learn about how to fight back with threat intelligence. Also uncover details on current industry trends and find out where things will go from here.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Sourcefire

5 New Laws of Antimalware Protection Keep Up with Evolving Threats
sponsored by Cisco
WHITE PAPER: Continue on to this essential white paper now to uncover five laws of anti-malware protection that can keep you safe.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Cisco

Next Generation Firewall Security Value Map
sponsored by Sourcefire
WHITE PAPER: Download this exclusive white paper for a value map of the top next-generation firewall options to see who reigns supreme.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Sourcefire

Reliable, Secure, and Direct Cloud Access Is Attainable
sponsored by Equinix
WHITE PAPER: View this resource to learn how the Equinix Cloud Exchange brings together cloud service providers and users, and enables private virtual connections for direct cloud access.
Posted: 26 Dec 2014 | Published: 26 Dec 2014

Equinix

Cybersecurity Is Essential for M&A Due Diligence (and Easier than You Think)
sponsored by BitSight
WHITE PAPER: This exclusive white paper looks at why cyber-security is essential an essential part of mergers and acquisitions (M&A) due diligence - and how rating the security potential of partners actually might be a lot easier than you think.
Posted: 26 Dec 2014 | Published: 26 Dec 2014

BitSight

What's Behind a Cyber Attack?
sponsored by Avnet
WHITE PAPER: The what, when, and how of an enterprise security incident
Posted: 24 Dec 2014 | Published: 15 Apr 2014

Avnet

Get over 33% OFF AVG CloudCare with Their Limited Time "3 for 2 Offer"
sponsored by AVG Technologies
RESEARCH CONTENT: Download this brief resource today to find out about a solution that will allow you to proactively deliver profitable cloud-based IT services, support mobile working, and protect your customers, devices, and data.
Posted: 24 Dec 2014 | Published: 24 Dec 2014

AVG Technologies

The Cisco 2014 Midyear Security Report Identifying the Weak Links
sponsored by Sourcefire
WHITE PAPER: Download this infographic for a mid-year security report. Cyber-threats are evolving at an alarming rate. Heartbleed, Java vulnerabilities, and POS weaknesses are just a few of the key areas of concern.Download this infographic for a mid-year security report.
Posted: 24 Dec 2014 | Published: 24 Dec 2014

Sourcefire

Research Finds More Organizations Use Big Data Analytics for Security
sponsored by RSA
EGUIDE: This expert e-guide explores the rise of Big Data security analytics.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

RSA
101 - 125 of 2733 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement