IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityReports
76 - 100 of 2557 Matches Previous Page  | Next Page
Securing virtual desktop infrastructure with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This paper explains how, by integrating an extensive set of network and application-layer protection mechanisms, Citrix® NetScaler® can provide advanced access and action control capabilities, deep visibility for rapid trouble shooting and a wealth of additional service delivery features.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Citrix

CIO’S Best Practices for Rogue IT
sponsored by LANDesk Software
EGUIDE: In this e-guide, learn how some modern CIO's are monitoring and responding to tech outside of the IT. Examine how to identify "healthy" versus "unhealthy" rogue IT as a means of mitigating risks.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

LANDesk Software

Why Your Company Should Consider Professional Security Services
sponsored by CDW Corporation
WHITE PAPER: This white paper details the professional security services offered by CDW, which include the people, partners, and planning capabilities to assist your organization in devising a comprehensive security strategy.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

CDW Corporation

After Malware: The Next Mobile Security Battle
sponsored by Sophos, Inc.
WEBCAST: In this webcast, you will find that malware is here to stay, yet it's not the only threat that we need to be aware of. Watch now to understand the battle beyond malware, considering vulnerable applications, advanced adversaries, and the enemy within.
Posted: 17 Jul 2014 | Premiered: Jul 7, 2014

Sophos, Inc.

Improve the Confidence in Your Big Data with IBM InfoSphere
sponsored by IBM
WHITE PAPER: This informative white paper discusses how organizations can use information governance to improve the confidence in big data.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

Facebook Secures Remote Access and Optimizes Virtual Application Environment
sponsored by F5 Networks
WHITE PAPER: Facebook wanted to upgrade the performance and availability of their virtual application environment, as well as improve the security of their remote access portal. In this case study, learn how Facebook achieved these goals by implementing an application delivery technology that ensures applications are fast, secure and available.
Posted: 17 Jul 2014 | Published: 23 May 2014

F5 Networks

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IntraLinks, Inc

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
WHITE PAPER: Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security
sponsored by Imperva
WEBCAST: This on-demand webinar, Gartner Research Director Adam Hils discusses how IPS and NGFWs leave dangerous gaps in enterprise security, explains why web application firewalls (WAFs) are worth the investment for enterprises, and reviews the major features of WAF technology, deployment options and selection guidelines.
Posted: 15 Jul 2014 | Premiered: Jul 15, 2014

Imperva

Cloud-Based Security Software Opens Floodgates for IT Innovation
sponsored by GFI Cloud
EGUIDE: In this expert e-guide, learn how one IT specialist was able to turn a modest investment in cloud-based security into a secured environment.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

The giant’s advantage: Why cloud computing levels the playing field for small businesses
sponsored by GFI Cloud
WHITE PAPER: In this white paper, you will find effective cloud computing solutions that will help your business grow—not only for technical purposes, but also with the relationship between your team.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities
sponsored by Thales
WHITE PAPER: In this white paper, discover the history of Microsoft Windows 2003 Server, including the cryptographic landscape when it was introduced and the improvements along the way.
Posted: 15 Jul 2014 | Published: 01 Jun 2014

Thales

Top Tips for Managing a Mobile Workforce
sponsored by GFI Cloud
WHITE PAPER: This white paper introduces several tips for managing and protecting a mobile workforce, including solutions compatible with cloud computing.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

GFI Cloud

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Multi-Layered Security
sponsored by GFI Cloud
WHITE PAPER: Discover several key controls for robust SMB malware defenses and learn about several popular attacks that cybercriminals have been known to use.
Posted: 14 Jul 2014 | Published: 31 Dec 2013

GFI Cloud

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

Gaining Control of the Cloud
sponsored by Gravitant
WHITE PAPER: This whitepaper covers how you can identify risks in the public cloud and offers a software solution to help keep you safe.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Gravitant

Compliance in the Cloud
sponsored by Alert Logic
EGUIDE: This expert e-guide introduces 5 simple tips to help improve your enterprise's threat and vulnerability management program.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Alert Logic

eGuide: Patching Vulnerabilities with Web Application Firewalls
sponsored by Alert Logic
EGUIDE: This eGuide explains how web application firewalls can help to patch vulnerabilities in web applications and protect your enterprise from current and future threats.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Weather centre secures remote access with HID Global’s strong authentication
sponsored by HID
CASE STUDY: In this case study featuring The European Centre for Medium Range Weather Forecasts (ECMWF), forecasts are gathered through data from satellites, buoys, ships and aircrafts—and all facilities across Europe need to remotely access this information.
Posted: 11 Jul 2014 | Published: 25 Mar 2013

HID
76 - 100 of 2557 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement