IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
126 - 150 of 2803 Matches Previous Page  | Next Page
How to Ease the Transition to New Mobile Devices
sponsored by Fiberlink
CASE STUDY: As more workers switch to iOS devices from BlackBerry and laptop, IT professionals struggle to have the same type of control over the network as they once had.  Organizations need a fast, easy to deploy solution before complete control is lost.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Fiberlink

Lumension 2014 Data Protection Maturity Report
sponsored by Lumension
WHITE PAPER: This report focuses on top security trends for 2014 and reveals the best practices for safeguarding sensitive information.
Posted: 26 Aug 2014 | Published: 30 Jan 2014

Lumension

Security Essentials for CIOs: Enabling Mobility in the Enterprise
sponsored by IBM
WHITE PAPER: This white paper discusses the issues that CIOs must face when dealing with personal and professional identities on mobile devices.
Posted: 26 Aug 2014 | Published: 31 Dec 2012

IBM

Connectivity is the Key to Improving Patient Information Exchange
sponsored by Kodak
WHITE PAPER: Discover how direct messaging can help create a smooth patient information exchange and improve workflow efficiency.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Kodak

Security Report 2014: Trends and Developments in the Security Industry
sponsored by IBM
WHITE PAPER: In this informative report, discover the most important security trends of last year, ranging from malware delivery to mobile device risks.
Posted: 26 Aug 2014 | Published: 28 Feb 2014

IBM

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

See what Security, Reliability and Efficiency looks like
sponsored by IBM and Intel.
WEBCAST: Tune in to this exclusive webcast to hear industry veterans examine a new server system that uses innovative new technology to provide enterprise-class data protection.
Posted: 26 Aug 2014 | Premiered: Sep 8, 2014

IBM and Intel.

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Reducing the Reputational Impact of Data Breaches and Cyber-Attacks
sponsored by IBM
WHITE PAPER: This informative white paper explores the top strategies and techniques to protect your reputation by increasing business resilience and IT security across the enterprise.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

IBM

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

Endpoint Threat Detection, Response, and Prevention for Dummies
sponsored by Bit9 + Carbon Black
EBOOK: In this in-depth eBook, gain critical insights into how organizations are targeted by advanced threats, and how your endpoints, servers, and other devices can function as entrances into your network for cyber criminals.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Keep Your Endpoints Secure with Customizable Advanced Threat Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This informative resource outlines a new approach to endpoint security that can provide your organization with real-time visibility and increased protection against modern cyber-attacks, including advanced persistent threats (APTs).
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Building the business case for continuity and resiliency
sponsored by IBM
WHITE PAPER: In this resource, discover what IT professionals are saying about IT risk management strategies and how you can add depth and breadth to your own business.
Posted: 25 Aug 2014 | Published: 30 Jan 2014

IBM

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab

Breaking Down Cloud Archiving Myths
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the misinformation and misconceptions that are preventing many organizations from taking full advantage of the cloud.
Posted: 25 Aug 2014 | Published: 21 Aug 2013

Hewlett-Packard Company

Six steps to effective reputational and IT Risk Management
sponsored by IBM
WHITE PAPER: This resource highlights 6 tips to effectively manage reputational and IT risk in order to protect and enhance brand value and competitive standing.
Posted: 25 Aug 2014 | Published: 30 Sep 2013

IBM

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Mobile Security: Threats and Countermeasures
sponsored by MobileIron
WHITE PAPER: Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

MobileIron

Ponemon Report: The Real Cost of Cyber Crime in 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this Poenmon study to discover the average cost to businesses of cyber crime, and how organizations can take steps to reduce security risks and costs.
Posted: 22 Aug 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

The Forrester Wave™: Privileged Identity Management, Q1 2014
sponsored by Centrify Corporation
ANALYST REPORT: This detailed report highlights the latest findings surrounding the privileged identity management (PIM) market within the past three years.
Posted: 22 Aug 2014 | Published: 03 Feb 2014

Centrify Corporation

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM
126 - 150 of 2803 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement