IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
51 - 75 of 2559 Matches Previous Page  | Next Page
Security in a Faster Forward World: Respond to a Constantly Changing Threat Landscape
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains some of the challenges in the current, evolving threat landscape. It also highlights the benefits of a website protection service with on-demand scale.
Posted: 18 Jul 2014 | Published: 30 Sep 2013

Akamai Technologies

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and Intel®

At Last, Profitable Endpoint Security for MSPs
sponsored by Webroot
WHITE PAPER: This white paper introduces one company's cloud-driven, cost-effective solution to the challenges that MSPs have long faced when it comes to providing endpoint security services.
Posted: 18 Jul 2014 | Published: 31 Oct 2013

Webroot

Architecting for the Cloud: Best Practices
sponsored by Amazon Web Services
WHITE PAPER: This paper focuses in on concepts, principles and best practices in creating new cloud applications or migrating existing apps to the cloud. Discover how elasticity and other concepts have emerged due to the cloud's dynamic nature.
Posted: 18 Jul 2014 | Published: 30 Jan 2011


Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Securing virtual desktop infrastructure with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This paper explains how, by integrating an extensive set of network and application-layer protection mechanisms, Citrix® NetScaler® can provide advanced access and action control capabilities, deep visibility for rapid trouble shooting and a wealth of additional service delivery features.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Citrix

CIO’S Best Practices for Rogue IT
sponsored by LANDesk Software
EGUIDE: In this e-guide, learn how some modern CIO's are monitoring and responding to tech outside of the IT. Examine how to identify "healthy" versus "unhealthy" rogue IT as a means of mitigating risks.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

LANDesk Software

Why Your Company Should Consider Professional Security Services
sponsored by CDW Corporation
WHITE PAPER: This white paper details the professional security services offered by CDW, which include the people, partners, and planning capabilities to assist your organization in devising a comprehensive security strategy.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

CDW Corporation

After Malware: The Next Mobile Security Battle
sponsored by Sophos, Inc.
WEBCAST: In this webcast, you will find that malware is here to stay, yet it's not the only threat that we need to be aware of. Watch now to understand the battle beyond malware, considering vulnerable applications, advanced adversaries, and the enemy within.
Posted: 17 Jul 2014 | Premiered: Jul 7, 2014

Sophos, Inc.

Improve the Confidence in Your Big Data with IBM InfoSphere
sponsored by IBM
WHITE PAPER: This informative white paper discusses how organizations can use information governance to improve the confidence in big data.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

Facebook Secures Remote Access and Optimizes Virtual Application Environment
sponsored by F5 Networks
WHITE PAPER: Facebook wanted to upgrade the performance and availability of their virtual application environment, as well as improve the security of their remote access portal. In this case study, learn how Facebook achieved these goals by implementing an application delivery technology that ensures applications are fast, secure and available.
Posted: 17 Jul 2014 | Published: 23 May 2014

F5 Networks

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Rogue IT on the Rise? SAM Strategies and Tools
sponsored by CDW Corporation
VIDEO: This exclusive video covers the need for software asset management to control end users during the rise of rogue IT.
Posted: 17 Jul 2014 | Premiered: 18 Apr 2014

CDW Corporation

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IntraLinks, Inc

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
WHITE PAPER: Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security
sponsored by Imperva
WEBCAST: This on-demand webinar, Gartner Research Director Adam Hils discusses how IPS and NGFWs leave dangerous gaps in enterprise security, explains why web application firewalls (WAFs) are worth the investment for enterprises, and reviews the major features of WAF technology, deployment options and selection guidelines.
Posted: 15 Jul 2014 | Premiered: Jul 15, 2014

Imperva

Cloud-Based Security Software Opens Floodgates for IT Innovation
sponsored by GFI Cloud
EGUIDE: In this expert e-guide, learn how one IT specialist was able to turn a modest investment in cloud-based security into a secured environment.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

The giant’s advantage: Why cloud computing levels the playing field for small businesses
sponsored by GFI Cloud
WHITE PAPER: In this white paper, you will find effective cloud computing solutions that will help your business grow—not only for technical purposes, but also with the relationship between your team.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities
sponsored by Thales
WHITE PAPER: In this white paper, discover the history of Microsoft Windows 2003 Server, including the cryptographic landscape when it was introduced and the improvements along the way.
Posted: 15 Jul 2014 | Published: 01 Jun 2014

Thales

Top Tips for Managing a Mobile Workforce
sponsored by GFI Cloud
WHITE PAPER: This white paper introduces several tips for managing and protecting a mobile workforce, including solutions compatible with cloud computing.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

GFI Cloud

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Multi-Layered Security
sponsored by GFI Cloud
WHITE PAPER: Discover several key controls for robust SMB malware defenses and learn about several popular attacks that cybercriminals have been known to use.
Posted: 14 Jul 2014 | Published: 31 Dec 2013

GFI Cloud
51 - 75 of 2559 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement