IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
26 - 50 of 2912 Matches Previous Page  |  Next Page
A guide to VDIs
sponsored by ComTrade
EGUIDE: Access this exclusive e-guide to learn seven questions and five criteria to consider to determine if VDI can create ROI for an organization. Also, discover the features, components, and use cases for Citrix's XenDesktop 7.5.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

ComTrade

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

Antivirus and Antimalware Solutions for VARs
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based endpoint security as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Webroot

The Strategic Impact of Mobile Transformation on Business Value
sponsored by VMware, Inc.
WHITE PAPER: This white paper serves as a survey of organizations in education, healthcare, high tech, and retail about the state of their mobile computing efforts. Access this analysis to see three major themes highlighted that are critical for success in mobile transformation.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

VMware, Inc.

Unified Network Solutions Case Study: Kettering Health Network
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how the KHN was able to achieve access to its electronic medical records system and other apps for its remote users. Read on here to key into the benefits of a unified network solution.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

F5 Networks

Opening the door to device diversity: A guide to mobile device management
sponsored by Intercity
WHITE PAPER: Access this white paper to learn how to embrace a diverse mobile device mix by adopting a mobile device management (MDM) platform within your organization.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Intercity

5 Super Powers To Look for When Evaluating DRaaS Providers
sponsored by Assuritive
WHITE PAPER: This white paper outlines and examines the five most indispensable attributes to look for when assessing DRaaS solutions. Read on here to learn how to evaluate using 5 criteria.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Assuritive

Security Essentials for CIO's: Establishing a Department of Yes
sponsored by IBM
WHITE PAPER: This white paper presents a five-step process for enterprise security that allows you to encourage business innovation without putting your business at risk.
Posted: 26 Aug 2015 | Published: 31 Mar 2012

IBM

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014

Webroot

Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013

VMware

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: To secure Amazon Web Services, users need to do their part by being smart about IAM permissions and AWS security groups.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS

Keep Data Secure in Today's High-Risk Environment
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how you can adopt data protection that provides the security you need in today's high-risk environment.
Posted: 25 Aug 2015 | Premiered: 31 Dec 2014

Hewlett-Packard Limited

Demand Secure and Durable Enterprise Performance with Tablets
sponsored by Panasonic - Microsoft
WHITE PAPER: This white paper serves as a guide for how to find tablets that will adapt to your shifting enterprise application demands. Read on here to evaluate several rugged tablet platforms designed to boost mobility and productivity.
Posted: 25 Aug 2015 | Published: 28 Feb 2014

Panasonic - Microsoft

Success in the Digital Banking Revolution: How to Securely Go Mobile
sponsored by HID
WEBCAST: In the first part of this two-part webcast, Christy Serrato, in Solutions Marketing at HID Global, addresses the challenges organizations face in the new era of digital banking, as well as discusses the barriers to mobile banking adoption, including coping with outdated legacy software integration.
Posted: 24 Aug 2015 | Premiered: Aug 24, 2015

HID

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015

Splunk

Top 10 Ways to Maximize Business Investment with UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper examines one UC platform that you can integrate into your existing enterprise infrastructure. Access this vendor report to consider which enterprise video and voice solutions will drive employee collaboration, and the top 10 ways to maximize your business ROI.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

Case Study: A SIEM Effective Enough for a Government Contractor
sponsored by Splunk
WHITE PAPER: This white paper describes how a technology integration business found a SEIM solution strong enough to protect the sensitive government information it manages.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Splunk

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: In this white paper, you'll discover how managed service providers and IT service providers can help their clients mitigate risk in this increasingly complex cyber threat landscape
Posted: 24 Aug 2015 | Published: 31 Dec 2014

LogicNow

AWS Partner Webcast - Use AWS CloudTrail Data and Splunk Software to Improve Security and Compliance
sponsored by Splunk
WEBCAST: Watch this webcast to learn how you can use AWS CloudTrail Data and Splunk Software to improve security and compliance in your AWS environment.
Posted: 21 Aug 2015 | Premiered: May 23, 2014

Splunk

The Top 6 Benefits of Switching to Enterprise Voice UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper highlights the top 6 benefits behind one software-based UC solution that will expedite all your collaborative initiatives. Read on here to learn how to access the following benefits that will lower the total cost of your enterprise communications.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

Polycom, Inc.

Threats Will Get In: What Will You Do About Them?
sponsored by Splunk
VIDEO: This brief video explains the necessity of adjusting your security strategy to focus more on detecting and mitigating threats.
Posted: 21 Aug 2015 | Premiered: 02 Jul 2014

Splunk

Why Your Layered Security is Filled with Holes – And What You Can Do About It
sponsored by Malwarebytes Corporation
TRANSCRIPT: In this webinar transcript, security experts discuss why your layered security may not be as effective as you think, and what you can do instead.
Posted: 21 Aug 2015 | Published: 21 Aug 2015


A New Approach to Staying Connected in the Changing Meeting Environment
sponsored by Polycom, Inc.
WHITE PAPER: This white paper serves as a guide for employing and enhancing video collaboration in your organization, and examines how you can create a fast paced, nimble, highly collaborative work environment.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.
26 - 50 of 2912 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement