IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
51 - 75 of 2917 Matches Previous Page  | Next Page
The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK: Learn how to integrate Wi-Fi security into your overall network strategy to help maintain security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

SearchSecurity.com

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Vendor vs. Vendor: Security Information and Event Management Solutions
sponsored by IT Central Station
ESSENTIAL GUIDE: Choosing a SIEM solution can be a daunting task with so many options to consider. To help make your decision easier, IT Central Station has compiled this overview of the leading SIEM solutions along with reviews from your fellow IT Professionals. Find out what solution best fits your needs with this comprehensive guide.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product Comparison: Network Performance Monitoring
sponsored by IT Central Station
ESSENTIAL GUIDE: With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Hightail for Enterprise: Mobile Overview
sponsored by Hightail
WHITE PAPER: This white paper details how to work seamlessly from mobile platforms using Hightail.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Hightail

The Self-Service Password Reset Checklist
sponsored by Tools4ever
WHITE PAPER: This white paper will help your organization to determine whether investing in a self-service password reset solution is worth it, providing a checklist of issues that your company may encounter along the way and a number of solutions to save you time and money.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Risk-Based Security Buyer's Guide: Addressing Enterprise-class Threats on an SME-class Budget
sponsored by TaaSera
WEBCAST: This exclusive whitepaper will show you how you must shift from a threat-based strategy that focuses on securing the perimeter to a risk-based approach that features a well-conceived incident response plan.
Posted: 08 Dec 2014 | Premiered: Nov 10, 2014

TaaSera

The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

Experts' Best Practices for Secure Remote Network Access
sponsored by ObserveIT
EGUIDE: This helpful guide compiles a number of expert tips on how to secure remote network access, including how to set up a secure home network; what to include in a remote access audit; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ObserveIT

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by CommVault
WEBCAST: In this exclusive webcast, Rachel Dines, Senior Analyst, Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive. View now to learn more.
Posted: 05 Dec 2014 | Premiered: Dec 5, 2014

CommVault

Plan to Migrate before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, explore why it is crucial to begin your migration away from WS 2003 now and what your options are for an upgrade. View a pros and cons list of several server and OS avenues you can take. Read on to discover IT professional insights to assess which solution is right for your organization's workload and budget.
Posted: 05 Dec 2014 | Published: 05 Nov 2014

Hewlett-Packard Company

Vectra Networks: X-Series Product Datasheet
sponsored by Vectra Networks
DATA SHEET: This exclusive resource outlines the key benefits of a network security strategy that was able to deliver for organizations today. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Vectra Networks

Case Study: Insider Threat Protection for Aruba Networks
sponsored by Vectra Networks
CASE STUDY: This exclusive case study takes an in-depth look at how one organization was able to protect their mobile-defined network against inside threats and advanced attacks. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Vectra Networks

Defending Against DDoS Attacks: Magnification, Protection & Mitigation
sponsored by A10 Networks
WEBCAST: This webcast highlights the need for durable network security, especially in the age of conniving hackers.
Posted: 05 Dec 2014 | Premiered: Jul 25, 2014

A10 Networks

Secure VDI Desktops the Same Way you Would Physical Ones
sponsored by Dell
EGUIDE: Download this expert resource now to learn about protecting your virtual desktops and much more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Dell

4 Reasons You Need a High Performance ADC
sponsored by A10 Networks
WHITE PAPER: This infographic points out 4 reasons why you need a high performance ADC for your business.
Posted: 05 Dec 2014 | Published: 01 Nov 2014

A10 Networks

Gartner Evaluates 12 Web Access Management Solutions
sponsored by IBM
WHITE PAPER: This white paper from Gartner evaluates 12 leading Web access management solutions on criteria like customer experience, core goods and services, and pricing.
Posted: 05 Dec 2014 | Published: 15 Nov 2013

IBM

A SIEM Buyer’s Guide for Resourced-Constrained Security
sponsored by SolarWinds, Inc.
WHITE PAPER: Check out this buyer's guide to learn about the critical security and compliance capabilities that you need without breaking the bank on SIEM.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

SolarWinds, Inc.

Protection for Every Enterprise: How BlackBerry® Security Works
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

Managing at the Windows Level
sponsored by AppSense
VIDEOCAST: In this video, expert Brian Madden discusses key desktop management trends, challenges and technologies, and reveals how to better manage your Windows users, accounts, and applications in virtual desktops. Find out how to securely and effectively deliver applications through virtual desktops to your predominantly mobile workforce.
Posted: 04 Dec 2014 | Premiered: Dec 4, 2014

AppSense

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by CommVault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

The Total Economic Impact of Druva inSync
sponsored by Druva Software
WHITE PAPER: Read this Forrester Total Economic Impact Study about a centralized console that improves data protection for mobile endpoints, drives cost savings, and improves productivity.
Posted: 04 Dec 2014 | Published: 31 Oct 2014

Druva Software

Vectra X-Series Deployment Guide
sponsored by Vectra Networks
WHITE PAPER: This deployment guide gives a brief overview of the deployment preparation, installation, and configuration of a Vectra X-series platform, which detects malware and cyber attacks at any phase.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vectra Networks

Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT
51 - 75 of 2917 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement