IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
26 - 50 of 2845 Matches Previous Page  | Next Page
Why Next-Generation Firewalls Are Critical To Your Organization’s Network Security
sponsored by Icomm Technologies
WHITE PAPER: This in-depth white explores the next generation of firewalls, which can provide more effective advanced threat protection, enhanced application intelligence and control, and higher performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Best Practices Guide for IT Governance & Compliance
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, discover three critical steps for maintaining compliance with external regulations and internal security policies.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

Dell, Inc.

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Transforming Resiliency and TCO
sponsored by Riverbed Technology, Inc.
WHITE PAPER: The branch office has always been a dilemma for IT teams.  They're a critical point of productivity and revenue, but come with a tremendous amount of overhead and risk.
Posted: 18 Sep 2014 | Published: 30 Apr 2014

Riverbed Technology, Inc.

Consolidating Remote Servers and Storage for Security, Efficiency
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out how to decouple storage from its server over any distance and be available as if it were local to applications at the edge in remote offices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Riverbed Technology, Inc.

The Balancing Act of Threat Intelligence and Risk
sponsored by CDW Corporation
WHITE PAPER: In this expert resource, get an inside at how risk management and threat intelligence affect global risk assessment, and how security officers can benefit from them.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Does Your SIEM Integrate Threat Data?
sponsored by CDW Corporation
WHITE PAPER: This expert eGuide explores how new technologies are integrating threat intelligence into SIEM solutions and enabling organizations to better prioritize security controls.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Threat-Aware Identity and Access Management for Mobile, Cloud, and Enterprise
sponsored by IBM
WHITE PAPER: This informative white paper presents new identity and access management (IAM) solutions with integrated threat prevention and analysis, increased granularity, and simplified user interfaces and dashboards.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

IBM

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce
sponsored by Absolute Software
CASE STUDY: This case study reveals how Intelligrated found a solution that would allow them to track and secure laptops in the field, in order to avoid any potential laptop theft.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

Absolute Software

Anatomy of a Cyber-Attack: How Cyber Criminals Operate, and How You Can Stop Them
sponsored by Icomm Technologies
WHITE PAPER: In this informative resource, get an inside look the basic steps of a cyber-attack, from reconnaissance to intrusion to malware insertion, as well as new integrated security solutions that can help prevent these malicious activities from disrupting your business.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

Icomm Technologies

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This concise info graphic presents a new encrypted traffic management solution that provides organizations with unprecedented visibility, control, and policy creation options.
Posted: 16 Sep 2014 | Published: 09 Dec 2013

Blue Coat Systems

2014 Gartner SIEM Market Report: Which Vendors Deliver?
sponsored by IBM
WHITE PAPER: In this Gartner report, get the facts on today's SIEM vendor landscape with in-depth evaluations and breakdowns of the top players and products in the industry.
Posted: 16 Sep 2014 | Published: 25 Jun 2014

IBM

Security for the Mobile First Era
sponsored by MobileIron
RESOURCE: Along with the great benefits of mobility came the daunting security risks.  As mobile networks becoming increasingly more diverse, it's important to have a security plan that can keep up.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

MobileIron

How Data Breach Investigation Solutions Can Help You Prepare for Future Malware Attacks
sponsored by IBM
WHITE PAPER: This informative white paper introduces a fast, simple, and comprehensive breach investigation solution designed to help organizations defend against advanced persistent and internal threats, including fraud and abuse.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

IBM

HIPAA/HITECH Compliance Using VMware vCloud Hybrid Service
sponsored by CDW Corporation
WHITE PAPER: Uncover the responsibilities for PHI in the cloud, as well as an introduction to the VMware Business Associate Agreement.
Posted: 15 Sep 2014 | Published: 31 Dec 2013

CDW Corporation

The Hidden Risks Behind Mobile Application Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper provides the findings on mobile application security, based on more than 2,000 mobile applications from over 600 companies.
Posted: 15 Sep 2014 | Published: 01 Feb 2014

Hewlett-Packard Company

HP Mobile Security Assessment
sponsored by Hewlett-Packard Company
DATA SHEET: In this resource, discover a mobile security assessment that tests your most sensitive applications.
Posted: 15 Sep 2014 | Published: 01 Jun 2013

Hewlett-Packard Company

Big Ideas, Big Tech: Tackling Oracle Backup in the Face of Massive Data Growth
sponsored by EMC Corporation
WEBCAST: As the criticality and quantity of data continues to grow, the gap between DBA and the Backup Administrator increase further. DBAs want to rely on their own backup rather than waiting for an administrator, while administrators complete tasks in the most efficient way possible.
Posted: 15 Sep 2014 | Premiered: Sep 15, 2014

EMC Corporation

Cloud computing and security: It’s all about automation
sponsored by CloudPassage
EGUIDE: An API-driven strategy could streamline cloud security and improve security overall. Read how in this expert e-Guide.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

CloudPassage

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Truly Mobile File and Print Solution Provides Enterprise-Wide Coverage
sponsored by Novell, Inc.
WHITE PAPER: In this informative white paper, discover a new enterprise-class mobile file and print solution that provides file syncing, sharing, and printing to users wherever they are – all without compromising compliance or security standards.
Posted: 15 Sep 2014 | Published: 31 Dec 2012

Novell, Inc.

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
26 - 50 of 2845 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement