IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
51 - 75 of 2647 Matches Previous Page  |  Next Page
Hospital La Fe Uses Vworkspace to Improve Security and It Maintenance
sponsored by Dell, Inc.
VIDEO: Access this brief video to see one healthcare organization's journey through administering their virtual desktops with a software solution that deploys and manages desktop virtualization and VDI technologies. Find out how they were able to simplify and automate the management of their VDI while increasing security and easing mobility.
Posted: 20 Mar 2015 | Premiered: 09 Feb 2015

Dell, Inc.

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
EBOOK: This exclusive e-book will teach you everything you need to know about the new world of encrypted traffic management. Don't let your enterprise security fall behind the SSL-using cybercriminals. Read more for a beginner's guide to protecting your network in today's world of cyber-threats.
Posted: 20 Mar 2015 | Published: 06 Mar 2015

Blue Coat Systems

Ensuring Secure Mobility for Healthcare Organizations
sponsored by Insight
WHITE PAPER: Access this white paper to learn how to develop a comprehensive mobile security framework. Lock out potential cyber thieves and ensure users have easy, reliable and secure access to essential data and services through their mobile devices.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Insight

How to resolve the Windows Server 2003 migration issue
sponsored by Lenovo
EGUIDE: In this expert e-guide, find out why Windows Server 2003 is not a viable choice for your business anymore, in terms of a virtual infrastructure.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Lenovo

Compliance and Security for Healthcare Providers Driving Access and Efficiency through User Context
sponsored by RES Software
WHITE PAPER: This white paper describes software that helps you speed and personalize access to applications and services throughout the organization without sacrificing privacy, security, and compliance.
Posted: 19 Mar 2015 | Published: 08 Jan 2015

RES Software

How to Prevent the Most Common IAM Failures
sponsored by SailPoint Technologies
WHITE PAPER: In this in-depth resource, discover how management failures can cause unexpected IAM problems.
Posted: 19 Mar 2015 | Published: 08 Oct 2014

SailPoint Technologies

Five Steps For Securing The Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper presents five essential steps to securing your database without sacrificing the high performance of modern data centers.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Wyse vWorkspace Supports Higher Education'€™s Desktop Virtualization Needs
sponsored by Dell, Inc.
WHITE PAPER: Inside this white paper, discover a desktop virtualization and application delivery solution that provides a platform that is simple, scalable and flexible, and delivers enterprise-class performance. Find out how its broad feature set serves the needs of higher education.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

What Does Fast IT Mean for Service Providers?
sponsored by Cisco Systems, Inc.
RESOURCE: View this resource to discover a platform designed to help service providers provide new services to businesses and consumers alike.
Posted: 19 Mar 2015 | Published: 11 Jun 2014

Cisco Systems, Inc.

Advanced Threat Protection
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

A Four-Step Roadmap to Fast IT
sponsored by Cisco Systems, Inc.
RESOURCE: Access this resource to discover a four-step roadmap to help you move forward with your IT model—encompassing people, organizational processes and technologies.
Posted: 19 Mar 2015 | Published: 04 Jun 2014

Cisco Systems, Inc.

IBM CIO Case Study: Fast and Easy Mobility Strategy Deployment
sponsored by Maas360 by IBM
CASE STUDY: This case study explains how the IBM CIO Office rapidly deployed a mobile device management strategy and on-boarded 15,000 devices in just one day. Read more to learn how one simple software solution can erase all of your worries about adopting a mobile strategy.
Posted: 19 Mar 2015 | Published: 28 Mar 2014

Maas360 by IBM

Choosing the Right Wi-Fi and APM Tools for Your Organization
sponsored by Extreme Networks
EGUIDE: Access this expert e-guide to discover the importance of strong Wi-Fi connectivity in healthcare—especially when it boils down to security and privacy.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Extreme Networks

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

Workspace Modernization for Healthcare Delivering Flexibility, Performance and Stability
sponsored by RES Software
WHITE PAPER: This white paper highlights a technology that improves the virtual clinical workspace to better meet the needs of healthcare users and IT professionals. Find out how this technology is tackling the issues associated with performance, reliability and stability, and updates and learn how this is helping them to deliver high-quality patient care.
Posted: 18 Mar 2015 | Published: 09 Jan 2015

RES Software

Data Center Micro-Segmentation
sponsored by VMware
WHITE PAPER: Access this white paper to explore the security capabilities of an SDDC approach and the VMware NSX network virtualization platform.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

VMware

Winning A Cloud Business Case Debate
sponsored by Cisco Systems, Inc.
EGUIDE: This expert e-guide highlights three key areas to focus on to create a strong cloud business case.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Cisco Systems, Inc.

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Extend the Value of Desktop Virtualization A Guide to Scaling Citrix Environments Easily and Predictably
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This expert white paper explores the benefits of using HCIAs for desktop virtualization. Find out what to look for in an HCIA and learn about deploying the right HCIA for Citrix environments. Also, discover end-to-end solutions from Dell that ease deployment challenges and make desktop virtualization more scalable and predictable.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

How to Improve Your Threat Intelligence
sponsored by Threatstream
WHITE PAPER: This white paper discusses those problems and how threat intelligence is evolving to fix them.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Threatstream

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

Empowering The Modern, Mobile Workforce
sponsored by JAMF Software
WHITE PAPER: The work of the modern, mobile workforce is no longer confined by place or by time. View this white paper to learn more about how you can empower your mobile workforce.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

JAMF Software

Unified Communications Security Measures: Ensuring Peace of Mind
sponsored by ThinkingPhones
WHITE PAPER: This white paper discusses the essential security features all unified communications should have.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones
51 - 75 of 2647 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement