IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
201 - 225 of 2842 Matches Previous Page  |  Next Page
Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Whitelisting: Develop Advanced Malware Protection
sponsored by Viewfinity
EGUIDE: This guide gives you a rundown on how whitelisting can help your security and what you can do to implement it.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Viewfinity

Implement a Dynamic Mobile Strategy Within Your Organization
sponsored by CA Technologies.
WHITE PAPER: Access this informative resource to learn about incorporating the best mobile practices within your organization.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

CA Technologies.

A Detailed Report on a Strong and Effective Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the detail you need on a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Executive ViewPoint - Successfully Securing Applications in a Mobility-Focused World
sponsored by F5 Networks
WHITE PAPER: In this whitepaper, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

F5 Networks

Integrated Network Security Architecture: Threat-focused Next-generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: How bad have things gotten and what should CISOs do to address these issues? Find out now by reading this whitepaper.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cisco Systems, Inc.

Cloudmark Security Platform for DNS
sponsored by Cloudmark
PRODUCT DEMO: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Premiered: 16 Feb 2015

Cloudmark

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by CommVault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

CommVault

Should Employees Have Local Admin Rights?
sponsored by Viewfinity
EGUIDE: This expert guide lays out the pros and cons of granting users local admin rights and suggests strategies for maintaining safety if you do choose to give out those rights.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Viewfinity

Profiling an Enigma: What We Know About North Korea's Cyber Warfare Capabilities
sponsored by Hewlett-Packard Company
PODCAST: This podcast takes a look at what is known about North Korea's cyber warfare programs, and how the country maintains such secrecy in these matters.
Posted: 16 Feb 2015 | Premiered: Oct 29, 2014

Hewlett-Packard Company

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

Four Tools for Capturing DDoS Attacks
sponsored by Neustar®
WHITE PAPER: This exclusive white paper describes four of the best tools you can use to detect DDoS attacks quickly.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Neustar®

Collaboration—Understand the Business Value and How to Make It Work
sponsored by Unify
WHITE PAPER: View this informative white paper to get some insight and an information framework to aid in successful planning and deployment of collaboration solutions.
Posted: 16 Feb 2015 | Published: 31 Oct 2014

Unify

Magic Quadrant for Network Access Control
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK: As online shopping burgeons, so does credit card fraud. We examine the latest credit card scams, and how technology and standards set by the Payment Card Industry can help.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchSecurity.com

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Trouble With Application Security? It's Time to Consider Web Application Firewalls
sponsored by Citrix
EGUIDE: Access this expert e-guide to find out how WAF can support secure application development.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Citrix

IT Policy Compliance for Dummies
sponsored by Qualys
WHITE PAPER: This free e-book explains everything you'll ever need to know about adhering to compliance rules.
Posted: 12 Feb 2015 | Published: 31 Dec 2010

Qualys

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Power Systems Cloud Infographic
sponsored by IBM
WHITE PAPER: Integrating security into your cloud allows you to deal with only 2% of the intrusions other architectures face. This infographic introduces a virtual server to deploy in the cloud that provides a 50% reduction in operational expenses.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

IBM

HP: Protecting Printers with Enterprise Grade Security by Moor Insights and Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the key security risks presented by today's networked printer and offers an overview of some innovative solutions that address them.
Posted: 11 Feb 2015 | Published: 30 Sep 2014

Hewlett-Packard Company
201 - 225 of 2842 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement