IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
51 - 75 of 2881 Matches Previous Page  |  Next Page
An Inside Look at Projected Hybrid Trends
sponsored by Peer1
VIDEO: Tune into this video to learn about several hybrid cloud trends projected for this year.
Posted: 19 May 2015 | Premiered: 19 May 2015

Peer1

How to Secure the Enterprise With Threat Intelligence and Protection Software
sponsored by AVG Technologies
EGUIDE: This expert guide can help you stay secure in today's threat landscape by helping you build a strong, layered security system that includes threat intelligence and multiple forms of endpoint protection.
Posted: 19 May 2015 | Published: 19 May 2015

AVG Technologies

4 Factors Forcing IT to Modernize End-User Computing
sponsored by VMware
WHITE PAPER: Access this white paper to explore the top four end-user trends that are forcing IT to modernize end-user computing. Also, discover expert advice from CIOs as they share best practices for end-user computing management – even when time and budget are tight.
Posted: 19 May 2015 | Published: 31 Dec 2014

VMware

Examining File Sync and Sharing Security
sponsored by IntraLinks, Inc
WHITE PAPER: Inside this white paper, examine one file sync, share, and collaboration platform and how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant and if this approach is right for your organization.
Posted: 18 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

Windows Server 2012: Security in the Enterprise
sponsored by Dell and Microsoft
WHITE PAPER: In the following technology brief, learn about the various security challenges brought about by cloud and virtual desktop practices. Access now and learn how to handle these security deficiencies, including how to leverage Windows Server 2012 to help aid in the process.
Posted: 18 May 2015 | Published: 18 May 2015

Dell and Microsoft

Checklist: Online Security Strategy Key Considerations
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides readers with a checklist designed to help assess your approach to online security and identify if there are any areas of your strategy that require reevaluation. Access now and gain a firm grasp on your online security strategy and learn what steps you can take to improve it.
Posted: 18 May 2015 | Published: 18 May 2015

Melbourne IT

The Keys to BYOD Security Success
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, you'll learn how to plan for BYOD security and discover tips for minimizing risk by enforcing solid policies with encryption.
Posted: 18 May 2015 | Published: 18 May 2015

Dell, Inc. and Intel®

Reduce Risk: Cisco Connected Factory Starter Kit
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover how this connected factory solution can help you plan, design, build, optimize, and manage your solution.
Posted: 15 May 2015 | Published: 01 Nov 2014

Cisco Systems, Inc.

Consolidate digital identities, devices, SaaS, apps and workflows with the cloud
sponsored by Matrix42
WHITE PAPER: This informative white paper reveals a solution that can help you enterprise perform at the top of its game through consolidation.
Posted: 15 May 2015 | Published: 15 May 2015

Matrix42

Securing Your Content Delivery Network
sponsored by Limelight Networks, Inc.
WHITE PAPER: In this brief white paper, you'll discover an in-network detection and attack mitigation solution that takes all the headaches out of content delivery network security.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.

Is Your Content Really Secure?
sponsored by Limelight Networks, Inc.
WHITE PAPER: Access this brief white paper to learn how you can simplify the content security process.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.

Do BYOD Users Have Too Much Corporate Data Access?
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this expert guide to learn how you can deploy powerful, secure mobile apps while controlling data access with mobile content management (MCM).
Posted: 15 May 2015 | Published: 15 May 2015

Dell, Inc. and Intel®

Using Intrusion Detection Systems for Improving ROI
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, discover how a strong IDS not only enhances your security, but also builds up your ROI.
Posted: 14 May 2015 | Published: 14 May 2015

Hewlett-Packard Company

Final Five Purchasing Decisions for Intrusion Detection Systems
sponsored by Hewlett-Packard Company
EGUIDE: This expert guide can help you ensure that you're making the right IDS choice with five considerations you need to think of before making your purchase.
Posted: 14 May 2015 | Published: 14 May 2015

Hewlett-Packard Company

Hosted Exchange 2013 Buyer’s Guide
sponsored by Rackspace
RESOURCE: Access this email hosting buyer's guide for a thorough 4-step explanation to finding a better Exchange.
Posted: 14 May 2015 | Published: 01 Dec 2014

Rackspace

The Case for Hosted Exchange
sponsored by Rackspace
WHITE PAPER: This white paper reveals the benefits of managing Microsoft Exchange in the cloud and lays out the detailed costs of managing a hosted versus an on-premises Exchange environment.
Posted: 14 May 2015 | Published: 01 May 2013

Rackspace

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 14 May 2015 | Published: 26 Dec 2014

IBM

Security Services: Beyond Malware and Antivirus
sponsored by AVG Technologies
WHITE PAPER: This white paper can help your MSP deliver effective and reliable security services in the modern threat landscape.
Posted: 14 May 2015 | Published: 14 May 2015

AVG Technologies

New Defence Strategy Needed To Combat Cybersecurity Adversaries
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper to learn why companies need to implement a new defense strategy to keep cybercriminals at bay.
Posted: 13 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

3 Tips for Choosing a NGFW
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll three basic tips for choosing the best next generation firewall for your SMB and links to further helpful resources.
Posted: 13 May 2015 | Published: 13 May 2015

Cisco Systems, Inc.

What Android for Work Means for the Enterprise
sponsored by MobileIron
WHITE PAPER: Access this white paper now to learn why the latest version of Android and the new Android for Work program can simplify your mobile management efforts.
Posted: 13 May 2015 | Published: 13 May 2015

MobileIron

Simplify Saas and On-premises Integration
sponsored by Oracle Corporation
WEBCAST: Software as a Service (SaaS) is growing in popularity and is driving the need for new SaaS apps to be easily integrated with existing on-premises counterparts. This video introduces middleware that simplifies integration and enforces consistency through a common integration platform for SaaS and on-premise apps.
Posted: 13 May 2015 | Premiered: May 19, 2014, 01:17 EDT (05:17 GMT)

Oracle Corporation

Reviews and Ratings for 11 Risk Management Products
sponsored by RSA
WHITE PAPER: In this Gartner report, you'll find reviews and ratings of eleven different products that promise make risk management and compliance easier.
Posted: 12 May 2015 | Published: 10 Mar 2015

RSA
51 - 75 of 2881 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement