IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
101 - 125 of 2790 Matches Previous Page  |  Next Page
Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

SearchSecurity.com

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is changing the role of IT rapidly. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Protect Information Like a Pro: A Guide for Enterprise CIOs
sponsored by Clearswift
EGUIDE: This CIO essential guide teaches you how to protect information and is designed to give IT leaders strategic management and decision-making advice.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Clearswift

Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

Plan to migrate before Windows Server 2003 end of life
sponsored by Dell and Microsoft
EGUIDE: View this expert e-guide to explore several top tips to help plan a migration before Windows Server 2003 fades out—from the starting points to what lies ahead.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Dell and Microsoft

FlexPod Datacenter with Microsoft Private Cloud
sponsored by Cisco Systems, Inc.
WHITE PAPER: View this white paper to learn about a private cloud solution that is designed for deploying Cisco® and NetApp technologies as a shared cloud infrastructure that has been validated under the Microsoft Private Cloud Fast Track v4 program.
Posted: 03 Jun 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Enabling enterprise data access on mobile devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn about a secure mobile productivity suite that increases employee access to enterprise data and applications without compromising security, employee privacy, or the personal user experience on the device.
Posted: 03 Jun 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

A strong information security program is a competitive gain, not just a cost
sponsored by Hewlett-Packard Company
EGUIDE: This e-guide discusses why good cybersecurity can win you more customers and gives you tips for getting the most return on your security investments.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Hewlett-Packard Company

Awareness and Protection Help Prevent Phishing and Spoofing in Email Marketing
sponsored by Neustar®
WHITE PAPER: Access this resource to see how to block fraudulent emails to your customers. Continue reading learn how to see who is sending emails from your organization and how to block emails coming from unauthorized users.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Neustar®

Why Should You Consider BYOD?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn what it takes to build a successful BYOD strategy.
Posted: 02 Jun 2015 | Published: 30 Jun 2014

Dell, Inc. and Intel®

Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able

VDI for 3D Model Global Collaboration in Construction
sponsored by NVIDIA/VMware
CASE STUDY: Download this case study to discover how one organization deployed virtual desktops to allow global team members to securely work together on graphically intense, centralized designs and 3D models. Find out how this increased efficiency while protecting valuable information.
Posted: 02 Jun 2015 | Published: 31 Jan 2014


Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Cisco

A10 Networks Thunder ADC Provides Protection from Encrypted Threats
sponsored by A10 Networks
VIDEO: Access this short video to see a visualization of the threat posed by encrypted data traffic, and what a solution looks like.
Posted: 02 Jun 2015 | Premiered: 02 Jun 2015

A10 Networks

Information Security Magazine: June Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at malware is adapting to virtual machines and strategies that can help organizations secure these environments.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchSecurity.com

Is a secure workspace approach right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: View this white paper to find out whether taking a secure workspace approach is the right way to go.
Posted: 01 Jun 2015 | Published: 01 Jul 2014

Dell, Inc. and Intel®

Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Hewlett-Packard Company

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is rapidly changing the role of IT. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 01 Jun 2015 | Published: 31 Jan 2015

Cisco
101 - 125 of 2790 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement