IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
176 - 200 of 2855 Matches Previous Page  |  Next Page
Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec

New Encryption Algorithm Put to the Test
sponsored by Symantec
WHITE PAPER: This white paper presents the results of several research tests performed on elliptic curve cryptography (ECC), a new and promising SSL/TSL encryption algorithm.
Posted: 23 Apr 2015 | Published: 31 Dec 2013

Symantec

Understand the Basics of a Data Center Hardware Refresh
sponsored by Curvature
EGUIDE: This expert e-guide explains why network and storage hardware upgrades, security products and training are some of the hidden virtualization costs that can throw off your TCO/ROI calculations.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

Curvature

The six most important things to know about VDI/DaaS security
sponsored by BitDefender
WHITE PAPER: This white paper describes the challenges of securing virtual desktops and suggests solutions for overcoming these challenges.
Posted: 23 Apr 2015 | Published: 31 Dec 2014

BitDefender

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Cloud Security Survey Report 2015
sponsored by CloudPassage
ANALYST REPORT: This comprehensive survey details what information security professionals believe is the current state of cloud security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

CloudPassage

How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

BlackBerry

The Elephant in the Room: What Vendors Are Hiding about Communications Security
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses why communications vendors don't discuss their products' security and shows you how you can ensure safety, compliance and reliability in all your business communications.
Posted: 22 Apr 2015 | Published: 31 Mar 2014

8x8, Inc.

Monitor Application Performance in the Hybrid Cloud With Full Visibility
sponsored by New Relic
WHITE PAPER: This white paper highlights how to achieve end-to-end visibility into application performance, regardless of where your application or parts of your application are running.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

New Relic

5 Best Practices to Reduce Incident Response Time
sponsored by Great Bay
WEBCAST: Join security guru Ty Powers as he explains the 5 best practices for reducing incident response (IR) time.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

Great Bay

SLA Management Checklist and Data Restoration Tips After a Breach
sponsored by Carbonite
EGUIDE: In this e-guide you will find a checklist of major items that should be addressed in service-level agreement before signing the dotted line, including security and privacy.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Carbonite

Case Study: Local Government Finds the Perfect Security Intelligence Solution
sponsored by IBM
VIDEO: In this video, discover how a local government found a security intelligence tool that met their needs.
Posted: 22 Apr 2015 | Premiered: 14 Jan 2015

IBM

How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER: This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

Make the Impossible Possible: Simplifying ISO Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives some helpful guidelines for compliance by laying out the steps necessary for complying with the latest revision of ISO.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

BalaBit

A Breakdown of Disaster Recovery Responsibilities
sponsored by Databarracks
WHITE PAPER: View this resource to pinpoint who is responsible for creating a disaster recovery plan, and which roles are responsible for what when a disaster strikes.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Databarracks

Website Security for Dummies
sponsored by Symantec
WHITE PAPER: In this free e-book, find clear, straightforward guidelines for ensuring airtight website security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

The Secret Ingredient in Mobile ROI
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn why security doesn't have to be a barrier to your business goals, but rather enable business decision-makers, end users and daily operations.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry

Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com

How You Can Protect Your Organization from Advanced Attacks
sponsored by IBM
WHITE PAPER: This white paper introduces a strategy that can reduce the rate of APTs and targeted attacks, and that can help you mitigate them when they do occur.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

IBM

Market Study: 7 Security Forensics Platforms
sponsored by IBM
WHITE PAPER: In this research report, find detailed reviews and ratings for seven leading security forensics platforms.
Posted: 21 Apr 2015 | Published: 31 Jul 2014

IBM

Research Reveals How Twelve MSS Options Perform
sponsored by IBM
WHITE PAPER: In this research report, discover how twelve MSS vendors measured up when tested.
Posted: 21 Apr 2015 | Published: 26 Feb 2014

IBM

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: This white paper explains the benefits of always-on SSL and how you can implement it on your sites.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Symantec

What's Missing from Your BYOD Strategy?
sponsored by Citrix
WHITE PAPER: Access this white paper to discover why moving beyond MDM and adopting an enterprise mobility management (EMM) solution is the key to properly handling mobility.
Posted: 21 Apr 2015 | Published: 27 Mar 2015

Citrix
176 - 200 of 2855 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement