IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
26 - 50 of 2811 Matches Previous Page  |  Next Page
Striking the Right Balance Between App Security and Usability
sponsored by CA Technologies.
WHITE PAPER: Access this informative white paper to discover how to balance mobile security with usability.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

CA Technologies.

Taking Steps to Protect Financial Mobile Applications from Cybercrime and Malware
sponsored by WhiteCryption
WHITE PAPER: This exclusive white paper takes an in-depth look at how to protect your mobile applications from cybercrime and malware. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

WhiteCryption

How to Develop Secure Mobile Apps With a Stellar User Experience
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights the importance of providing a better application experience, as well as how to secure the mobile application development and delivery process.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

CA Technologies.

The Evolving Threat Landscape
sponsored by Threat Track Security
WHITE PAPER: The following white paper presents an interview with a leadinging expert on security technology on how cybercrime has evolved.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Threat Track Security

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper discusses securing cloud applications in an agile world.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Rackspace

IBM X-Force Threat Intelligence Quarterly - 3Q 2014
sponsored by IBM
WHITE PAPER: This exclusive white paper takes a look at how Heartbleed impacted organizations around the world.
Posted: 20 Feb 2015 | Published: 31 Aug 2014

IBM

Mobility on hold: Get back on track with mobile risk mitigation
sponsored by IBM
WHITE PAPER: This white paper introduces one security system that keeps up with the risks of mobile banking.
Posted: 20 Feb 2015 | Published: 31 Dec 2013

IBM

BYOD and Beyond: Balancing User and Enterprise Needs in Mobile Security Policy
sponsored by SearchConsumerization.com
EBOOK: Bring your own device policies are a key part of any enterprise mobility strategy, but that's just the start. BYOD policies must address acceptable use, enforcement and privacy.
Posted: 20 Feb 2015 | Published: 20 Feb 2015


Next Generation Firewalls: What Can They Do for You?
sponsored by Cisco
EGUIDE: In this expert guide you can find tips on assessing your security needs and deciding if a next generation firewall is a smart choice for you.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Cisco

Better Defend Your Network with Better Anti-Malware
sponsored by Threat Track Security
WEBCAST: This webcast gives you the details on a comprehensive, reliable anti-malware system.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

Threat Track Security

Internet of Things
sponsored by Axway
WHITE PAPER: The Internet of Things can be very beneficial, but security and privacy are crucial. Since the devices in the Internet of Things rely on APIs to communicate, the management of these APIs is also crucial. Access this white paper key to learn how to enable the Internet of Things through efficient API management implemented with speed and security.
Posted: 19 Feb 2015 | Published: 24 Sep 2013

Axway

The Danger from DDoS Increases
sponsored by Neustar®
WHITE PAPER: This survey report tells you everything you need to know about how DDoS attacks have changed and why you should be concerned.
Posted: 19 Feb 2015 | Published: 31 Dec 2014

Neustar®

Don't Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper gives you information on how DDoS attacks have evolved and what you can do to stop them.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Neustar®

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

New Threats to Healthcare and How to Stop them
sponsored by NaviSite
WEBCAST: This webcast provides you with a detailed analysis of healthcare's security threats and suggestions for combatting them.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

NaviSite

How Smart Enterprises are Tackling Workspace Transformation
sponsored by Unisys
WHITE PAPER: Access this white paper to discover how workspace-as-a-service is a user centric approach to modern workspaces that allows for anytime, anywhere access.
Posted: 19 Feb 2015 | Published: 31 Dec 2014


Application Whitelisting: Discover the Pros and Cons
sponsored by Threat Track Security
WHITE PAPER: This webpage explores the option of whitelisting, dissecting its pros and cons.
Posted: 18 Feb 2015 | Published: 04 Nov 2013

Threat Track Security

Predictions from the Front Lines for Cybersecurity in 2015
sponsored by Threat Track Security
WHITE PAPER: This white paper summarizes the results of a survey of security professionals, revealing what IT professionals are thinking and why in 2015.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Threat Track Security

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Whitelisting: Develop Advanced Malware Protection
sponsored by Viewfinity
EGUIDE: This guide gives you a rundown on how whitelisting can help your security and what you can do to implement it.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Viewfinity

Implement a Dynamic Mobile Strategy Within Your Organization
sponsored by CA Technologies.
WHITE PAPER: Access this informative resource to learn about incorporating the best mobile practices within your organization.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

CA Technologies.
26 - 50 of 2811 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement