IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
76 - 100 of 2730 Matches Previous Page  |  Next Page
Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

Staying on the Case - George Jon & Associates setup scalable technologies to support eDiscovery
sponsored by Dell Software
WHITE PAPER: Learn how George Jon & Associates is enabled to help law firms and service bureaus deliver documents quickly and securely with Dell hardware and software solutions.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Dell Software

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

SQL Server 2014 – Big Benefits for Analytics: Part 1
sponsored by Insight
TRANSCRIPT: Learn from the experts as they discuss what a real end user needs for business analytics success and how SQL Server 2014 can help.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Insight

Control the Flow of Content and Keep Your Organization Safe
sponsored by Box
WHITE PAPER: This important white paper dives into an admin console that will allow you to secure, manage, and report on all of your employees and their content.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Box

The 15 MDM Providers That Matter Most, and How They Stack Up
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, Forrester identifies, evaluates, and compares the 15 foremost MDM providers, detailing how well each vendor fulfills key requirements and where each provider stands in relation to the others.
Posted: 08 Jan 2015 | Published: 30 Sep 2014

Symantec Corporation

Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper explores the stages of Regin, breaking down its complex architecture.
Posted: 08 Jan 2015 | Published: 22 Nov 2014

Symantec Corporation

Keep Your Data Safe in the Era of Distributed Computing
sponsored by Box
RESOURCE: Download this exclusive infographic now to learn about protecting your business content in the era of distributed computing.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

Box

How Mobile Security Is Shifting From Device To Data, Apps
sponsored by CommVault
WHITE PAPER: In this e-guide, learn why enterprise mobile security is no longer as simple as protecting an employee's device, and how CommVault is shifting with the industry and providing backup to people other than storage admins. Read on to learn more.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

CommVault

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Corporation
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Corporation

Key Challenges for Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper offers a look at the key challenges of EMM and suggests ways to balance IT needs with user wants. Read on to learn more.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

BlackBerry

Resolve to Revitalize Your SIEM Security
sponsored by SearchSecurity.com
EBOOK: It's a new year, with new threats. Here's a thorough examination of four capabilities some new security information and event management (SIEM) products are offering.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

SearchSecurity.com

EMC Global Data Protection Index: Global Key Results & Findings
sponsored by EMC Corporation
WHITE PAPER: This informative resource presents the results of a recent survey on trends in enterprise data protection, which collected data from 3,300 IT leaders across 24 countries.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

EMC Corporation

Improve Enterprise Security in the Age of Cloud and Mobile Computing
sponsored by Box
WHITE PAPER: This exclusive white paper offers up a security approach that can protect your data in the age of the cloud and mobile computing.
Posted: 07 Jan 2015 | Published: 06 Mar 2014

Box

3 Questions Every CIO Should Ask About Virtual Server Data Protection
sponsored by CommVault
WHITE PAPER: This whitepaper examines what today's IT leaders need to know about providing comprehensive protection for virtual machines – especially in terms of scalability, recovery capabilities and application integration.
Posted: 07 Jan 2015 | Published: 13 May 2014

CommVault

It's Time to Get Serious About Protecting Sensitive Data in Transit
sponsored by Certes Networks
WHITE PAPER: This white paper explains why it's long past time to get serious about protecting your sensitive data as it travels across networks, and also lists 3 steps that you can take to avoid being a hacking statistic in 2015.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Certes Networks

The Cloud Is More Secure Than Traditional IT Systems - Here's Why
sponsored by Dimension Data
EGUIDE: This expert guide explains why when it comes to cloud security, the physical location of your data matters less than the means of access.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Dimension Data

The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Symantec Intelligence Report October 2014
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper summarizes the current trends in the threat landscape.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Symantec Corporation

Speaking the same language: Cloud on common ground
sponsored by IBM
EBOOK: Check out this guide to find out how the hybrid cloud can impact 4 major business units, including finance, marketing, operations, and human resources.
Posted: 05 Jan 2015 | Published: 01 Nov 2014

IBM

Creating a successful road map for cloud deployment
sponsored by IBM
WHITE PAPER: View this informative resource to access critical steps needed on the journey to meet your business needs and long-term career goals.
Posted: 05 Jan 2015 | Published: 01 Nov 2014

IBM

CW Europe – January 2015
sponsored by ComputerWeekly.com
EZINE: As we start another new year, we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

The Global State of Enterprise Mobility 2014/15
sponsored by ComputerWeekly.com
RESEARCH CONTENT: An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

Six Areas Where Citrix XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, explore an application virtualization strategy that includes the capabilities organizations need for full mobile productivity and how any strategy you choose should take into consideration the end-user and IT.
Posted: 02 Jan 2015 | Published: 28 Nov 2014

Citrix

Citrix NetScaler- A Foundation for Next-Generation Datacenter Security
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at traditional security concerns, plus a look at new security models that are paving the way today. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Citrix
76 - 100 of 2730 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement