IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
176 - 200 of 2857 Matches Previous Page  |  Next Page
Surviving in a State of Denial
sponsored by SearchSecurity.com
EBOOK: DDoS prevention begins with understanding the nature of the latest attacks. Learn what your system is up against when it comes to DDoS and how configuration can help contain them.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

Information Governance: Fighting Back Against the Exponential Data Curve
sponsored by Symantec | Veritas
WHITE PAPER: This white paper focuses on information governance, specifically fighting back against the exponential data growth we are facing.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Symantec | Veritas

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Disrupting the Enterprise: Why Outlook No Longer Makes Sense
sponsored by Cloud Sherpas
WHITE PAPER: Access this white paper to find out if Microsoft Outlook is evolving to keep up with the BYOD revolution and whether it meets the needs of the business when it comes to performance, security and cost.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Cloud Sherpas

The Top 10 Strategic Trends for 2015
sponsored by Gartner
WEBCAST: This exclusive Gartner presentation contains a detailed evaluation of the top 10 trends that will revolutionise the world of IT in the near future.
Posted: 11 Jun 2015 | Premiered: Jun 11, 2015

Gartner

Edge for the Operations Support User
sponsored by Unisys
VIDEO: This video reveals a service management operations console that provides access to all the tools and information organizations need to quickly (and securely) address service requests and IT issues.
Posted: 11 Jun 2015 | Premiered: 11 Jun 2015

Unisys

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

Edge for the Mobile End User
sponsored by Unisys
VIDEO: This video features a service management solution that allows your mobile users to quickly and easily manage their service needs on the go—from any location and on any device.
Posted: 10 Jun 2015 | Premiered: 10 Jun 2015

Unisys

Access the Intercloud: Cloud the Way You Want It
sponsored by Cisco
WHITE PAPER: View this white paper to learn more about a globally connected network of clouds that deliver the secure cloud services you need everywhere in the world.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Cisco

The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

EMA Research Report: Data-Driven Security Reloaded
sponsored by Prelert
RESEARCH CONTENT: This report is a summary of the results of the DDSR research survey and offers insight into the thinking of 200 IT professionals who support IT security.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Prelert

Accelerate How You Innovate
sponsored by Dimension Data
WHITE PAPER: In this report, learn from several executives and technology experts about the key challenges they are facing with data centers in the era of the cloud.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Dimension Data

Microsoft Collaboration and Productivity Apps: A Dedicated Private Cloud for Your Microsoft Application
sponsored by Rackspace
WHITE PAPER: Read this white paper to find out why a dedicated private cloud is the best environment to run your Microsoft collaboration and productivity apps.
Posted: 08 Jun 2015 | Published: 18 May 2015

Rackspace

Computer Weekly – 9 June 2015: The file-sharing face-off: Box or Dropbox
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the two most popular tools for cloud-based enterprise file sharing and assess the relative merits of Box and Dropbox. We talk to some of the early pioneers in developing smartwatch apps. And we find out why IT security spending is shifting from prevention to detection and response. Read the issue now.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

ComputerWeekly.com

An E-Guide to Online Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines several ways to develop and implement long-term security strategies to proactively defend against evolving security risks. Access now and learn what it takes to beef up your online security quick and efficiently.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Melbourne IT

Risk-Free VDI with Tintri and Citrix
sponsored by Tintri
WHITE PAPER: Many IT organizations are turning to virtual desktop infrastructure (VDI) technology to reduce the cost, complexity, and risk associated with desktop management. Access this white paper to find out how to gain end-to-end insights into the storage infrastructure for unmatched VM control. Learn how to you make your VDI successful.
Posted: 05 Jun 2015 | Published: 07 Jul 2014

Tintri

How Companies Used the Tesla Model for Personal Computing
sponsored by NVIDIA/VMware
JOURNAL ARTICLE: Access this informative article to learn how NVIDIA, Dell, and VMware used a similar model to the Tesla automotive model to develop a hardware platform targeted at high-end workstation users who were dissatisfied with traditional workstations. Explore the benefits organizations saw when adopting this platform.
Posted: 05 Jun 2015 | Published: 25 Mar 2015


Optimizing the Mobile Workforce
sponsored by Calero Software
WHITE PAPER: Read this white paper to learn how you can find the right balance of policy, plans, enforcement, support and user experience necessary for successfully optimizing the mobile workforce.
Posted: 05 Jun 2015 | Published: 26 Dec 2014

Calero Software

Ecommerce & Media Websites: A Custom Private Cloud to Handle Your Complex Website Requirements
sponsored by Rackspace
WHITE PAPER: E-commerce and media-rich websites require robust infrastructure, security, compliance, and high availability. A custom private cloud can handle these complex websites. Read this white paper to find out how to support the needs of these websites.
Posted: 05 Jun 2015 | Published: 18 May 2015

Rackspace

Fighting a Security Epidemic
sponsored by Hewlett-Packard Company
WHITE PAPER: Breaches are growing in number—and are difficult to detect. Learn how to make sure you aren't part of the epidemic.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

TOPICS:  Security
Hewlett-Packard Company

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

How to achieve project success with the private cloud
sponsored by Dell and Microsoft
EGUIDE: This expert e-guide reveals 5 questions that explain what the private cloud really is, if it guarantees security, how to optimize private cloud performance, and much more.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Dell and Microsoft
176 - 200 of 2857 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement