IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
126 - 150 of 2957 Matches Previous Page  |  Next Page
Secure by Design: Balancing Security with Employee Productivity
sponsored by Citrix
WHITE PAPER: This white paper explores an app virtualization solution that addresses today's growing IT security challenges while giving users fast, simple, and flexible remote access.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Citrix

MicroScope August: Security Update
sponsored by MicroScope
EZINE: An issue looking at how the channel can overcome the skills problems and a chance to hear from a range of leading vendors on how the security market is faring
Posted: 06 Aug 2015 | Published: 07 Aug 2015

MicroScope

Selecting a SIEM: Experiences from the Trenches
sponsored by LogRhythm, Inc.
WEBCAST: This webcast features a panel discussion that will give you practical insights from SIEM veterans to help you refine your security intelligence strategy.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

FICO and Red Hat Seed the Cloud with Enterprise Innovations
sponsored by Red Hat
WHITE PAPER: Platform-as-a-service tools have become the market's leading solution for business rules management. This white paper examines a new and emerging PaaS cloud computing solution (one of which features promises any time, on-demand access to a full-service cloud-based application platform). Read on here to learn about receiving the following benefits.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper describes ten steps you can take to increase your cybersecurity.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Absolute

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Managed Security Services: How Can They Benefit You?
sponsored by IBM
WHITE PAPER: This white paper discusses the financial and technological benefits of investing in managed security services.
Posted: 06 Aug 2015 | Published: 31 Jan 2014

IBM

Data protection: Time-Proven Truths for Your Virtual World
sponsored by Datalink
WHITE PAPER: This white paper presents four steps you can take to make the right data protection and backup decisions for your environment.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Datalink

EMM Report Card: 10 Mobility Suites to Keep an Eye On
sponsored by IBM
WHITE PAPER: This white paper examines and compares 10 of the top EMM suites to look out for, highlighting the pros and cons to each. Read on to find out which dynamic suite best stacks up when it comes to the EMM magic quadrant of features.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

IBM

Achieve business continuity and keep people productive with remote access
sponsored by Citrix
WHITE PAPER: This white paper discusses an approach to business continuity that leverages multiple virtualization technologies to provide the flexible mobile and remote access needed to keep the workforce connected to the critical apps and data they depend on.
Posted: 06 Aug 2015 | Published: 31 May 2013

Citrix

Does Open Source Software Still Make Sense? 10 Reasons Why
sponsored by SERENA Software, Inc.
WHITE PAPER: This white paper explores the unexpected costs of OSS, and provides several case examples to look at how and when we use OSS. Click here to find out how the following contribute to the security of your software development lifecycle (SDLC).
Posted: 05 Aug 2015 | Published: 05 Aug 2015

SERENA Software, Inc.

10 SIEM Platforms and Their Security Event Management Success
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

The Capabilities of 10 SIEM Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: This report analyzes ten different SIEM technologies for risk management capabilities and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: This white paper can help you make the migration to Windows 10 without sacrificing your security.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Absolute

Bolstering Network Security in a BYOD World
sponsored by VSS Monitoring
WHITE PAPER: As the world becomes more interconnected, the line between personal and professional continues to blur. This white paper examines a monitoring platform that will enable you to comprehensively view all network traffic to your organization's security toolset. Read on to learn how you can optimize your network for increased BYOB mobile traffic.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

VSS Monitoring

Critical Capabilities for Client Management Tools
sponsored by Absolute
WHITE PAPER: This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 05 Aug 2015 | Published: 13 Jun 2014

Absolute

Securing the Supply Chain: 3 Considerations Developers Should Know
sponsored by Rogue Wave Software
WHITE PAPER: Access this white paper to learn 3 strategies for implementing and ensuring secure software development. Also, learn how the roles of automobile manufacturers have shifted to include software security control.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

Rogue Wave Software

Top 10 Caveats Mobile IT Admins Need to Know about Windows 10
sponsored by MobileIron
WHITE PAPER: Previously separate OS versions are converging onto a unified platform. Download the easy-to-digest infographic for a list of the top 10 things you need to know about Windows 10 to keep pace with industry updates...and your peers.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

Why Planning is Key to Incident Response
sponsored by CrowdStrike
EGUIDE: This expert guide discusses how to most effectively plan for incident response and business recovery.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

CrowdStrike

Malware Defense: How to Detect and Mitigate Advance Evasion Techniques
sponsored by CrowdStrike
EGUIDE: In this e-guide, a security expert explores the evasion techniques used by advanced malware and explains how to detect and mitigate these threats.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

CrowdStrike

Endpoint Threat Detection Gets More Response
sponsored by CrowdStrike
EGUIDE: This expert guide discusses the importance of including detection alongside monitoring and remediation capabilities in your endpoint security strategy.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

CrowdStrike

Your Guide to Secure Databases
sponsored by Oracle Corporation
WHITE PAPER: This resource contains tips on enhancing your information security by securing databases directly.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

Oracle Corporation

How to Secure Your Ecosystem of Cloud-Based Apps
sponsored by MobileIron
WHITE PAPER: Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees. This white paper reviews one app security model and how it can be leveraged to secure cloud-based productivity suites on mobile devices.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

From GPO to MDM: A New Era of Enterprise Computing
sponsored by MobileIron
WHITE PAPER: This white paper looks to enterprise mobility management (EMM) as the primary means of securing and managing enterprise devices during the evolution of operating systems.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron
126 - 150 of 2957 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement