IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
151 - 175 of 2882 Matches Previous Page  |  Next Page
Everything You Need To Know About Private Clouds
sponsored by Accelerite
EBOOK: This ebook highlights 6 major areas you need to focus on to successfully create a private cloud for your company.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Accelerite

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 30 Apr 2015 | Published: 30 Nov 2013

Dell, Inc. & Intel®

Does Android Dream of Enterprise Adoption?
sponsored by IBM
WHITE PAPER: This white paper explains how you can protect yourself from common Android security holes with the proper MDM platform so that you can take advantage of the employee productivity benefits. If you're nervous about user management, data consumption, rooting and other issues, then this is the resource for you.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Securing the Mobile Enterprise Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore best practices for addressing security issues for the mobile enterprise environment, including those for establishing secure mobile access and mobile device security. Discover solutions designed to help your organization maintain tight network and mobile device security while still enhancing employee productivity.
Posted: 29 Apr 2015 | Published: 30 Sep 2014

Dell, Inc. and Intel®

Getting the most out of your cloud deployment
sponsored by BitDefender
WHITE PAPER: In this white paper, discover tips for efficiently transitioning to the cloud and ensuring cloud application security.
Posted: 28 Apr 2015 | Published: 31 Dec 2014

BitDefender

Why a Secure Enterprise Workspace is the Best Approach for Mobile Productivity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, explore how a secure enterprise workspace can help to improve mobile productivity while meeting your organizations requirements for security, manageability, and configurability.
Posted: 28 Apr 2015 | Published: 27 Feb 2015

Dell, Inc. and Intel®

Next Generation Security for Virtualized Datacenters
sponsored by BitDefender
WHITE PAPER: In this white paper, discover what a virtual environment needs in order to maintain its security.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

IT Security: Creating Heroes Instead of Headaches
sponsored by BitDefender
WHITE PAPER: In this white paper, discover insights on how you can transform your security system into one that not only protects your business, but propels it forward as well.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

Advanced Threat Protection for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This free e-book gives you essential information on advanced threat protection (ATP), including tips for using big data security analytics and best practices for advanced threat mitigation.
Posted: 28 Apr 2015 | Published: 31 Dec 2013

Blue Coat Systems

Balancing Security and Mobility with the Right MDM Solution
sponsored by IBM
WHITE PAPER: Access this white paper now and discover how you can embrace IT consumerization be adopting a mobile device management (MDM) system that can provide all of the security you need without sacrificing the benefits of mobility.
Posted: 28 Apr 2015 | Published: 26 Dec 2014

IBM

The 2015 Guide to Cloud-Based Disaster Recovery
sponsored by Accelerite
WHITE PAPER: This white paper reveals the answers to several key questions IT professionals have about cloud-based disaster recovery, as well as helpful info around the important concepts to understand.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

Accelerite

Dell Data Protection: Protected Workspace, Preventing Malware Attacks
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to learn how application virtualization can be used to create a protective barrier around applications that employees use that run untrusted content. Find out the steps involved in this process and how this can prevent attackers from ultimately gaining access to endpoints.
Posted: 28 Apr 2015 | Published: 28 Jun 2013

Dell, Inc. & Intel®

Bring Your Own Device: Policy Considerations
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn everything you need to know when building a clear and concise policy document for your BYOD strategy.
Posted: 28 Apr 2015 | Published: 13 Jun 2014

Good Technology

Flexible, secure solutions to keep unauthorized users out of your data
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, find out how to go beyond passwords with advanced authentication measures in order to secure data at every endpoint in your organization. Discover security tools that are designed to provide an end-to-end coverage and support for advanced hardware authentication.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

Dell, Inc. and Intel®

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Newest Data Center Dilemma: Security vs. Performance
sponsored by BitDefender
WHITE PAPER: This white paper elaborates on the security concerns of virtualized environments and why traditional security approaches don't work.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Data Center Security: A Comprehensive Guide to Mitigating Data Center Risks
sponsored by Alcatel-Lucent
WHITE PAPER: Read this white paper to learn about a holistic approach to data center security that will detect more threats, launch more effective counterattacks and better protect your data overall.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Alcatel-Lucent

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Securing the Virtual Infrastructure without Impacting Performance
sponsored by BitDefender
WHITE PAPER: This white paper discusses some of the most common security pitfalls found in virtualized environments and suggests ways to avoid them.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Outsourcing Security Services: What You Need to Know
sponsored by Digital Guardian
EGUIDE: In this expert guide, discover tips for choosing the right security service provider, writing an SLA, and more.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Digital Guardian

The hidden costs of self-signed SSL certificates
sponsored by Symantec
WHITE PAPER: Read this white paper to discover a detailed breakdown of the real total cost of ownership of a self-sign SSL certificate.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Symantec

Secure network traffic between hosts systems and remote PCs/web browsers
sponsored by OpenText
PRODUCT OVERVIEW: Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.
Posted: 24 Apr 2015 | Published: 31 Mar 2015

OpenText

Critical Factors to Endpoint Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. & Intel®

How Privileged Activity Monitoring Streamlines Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives suggestions for how you can use privileged activity monitoring to simplify your audit creation , particularly when it comes to ISO compliance.
Posted: 24 Apr 2015 | Published: 24 Feb 2014

BalaBit

Why Activity Monitoring Should Supplement Log Management
sponsored by BalaBit
WHITE PAPER: In this white paper, discover how you can fill in your log management gaps by monitoring privileged users.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

BalaBit
151 - 175 of 2882 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement