IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
1 - 25 of 1889 Matches Previous Page  |  Next Page
The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to the Anti-Phishing Work Group Q1 report, the number of phishing websites increased 250% from the last quarter of 2015 through the first quarter of 2016. Explore this white paper to reveal how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

The 12 Critical Questions you Need to Ask when Choosing an AD Bridge Solution
sponsored by One Identity
WHITE PAPER: Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users. Read this white paper to identify a number of key questions to ask when evaluating which AD bridge solution is right for you.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks. Explore this white paper to uncover a cloud security platform that can provide you with protection your organization lacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly importna to have a holistic defense strategy in place. Inside, discover the 4 stages to digital workplace security, and a service that can help you make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid

TOP 10 Considerations for Bot Management
sponsored by Akamai Technologies
WHITE PAPER: There are countless vendors claiming to provide you with bot management solutions and comprehensive protection, but what do you really need to keep your own environment safe? Read this list of the top 10 things to consider when selecting a bot management system.
Posted: 22 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

Securely Managing your UNIX Environment
sponsored by One Identity
WHITE PAPER: Take a look at this white paper to uncover how IAM challenges within UNIX can be overcome with the right practices and tools.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

Single Sign-on for SAP Solution-based Environments
sponsored by One Identity
WHITE PAPER: Authentication Services enables many non-Windows systems – including SAP solutions – to participate as "full citizens" in Active Directory. Take a look at this white paper to uncover security benefits provided by authentication services.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Extending Native Active Directory Capabilities to Unix and Linux
sponsored by One Identity
WHITE PAPER: As enterprises become more complex, involving multiple operating systems and the challenges of identity management also become greater. Take a closer look at this white paper to reveal security capabilities for Unix and Linux in comparison to other security systems.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Top 6 Things Small Businesses Need to Know about Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: According to a Kaspersky Lab survey, just one cybersecurity incident can cost small- and medium-sized businesses an average of $86,500. Read this white paper to reveal a list of the top things startups and small businesses need to know about cybersecurity.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

Business Perception of IT Security: In the Face of an Inevitable Compromise
sponsored by Kaspersky Lab
WHITE PAPER: Companies unanimously state that cyber threats are highly damaging and that cybersecurity is one of the top requirements for business to stay afloat. Take an in-depth look at this security risk report to reveal where enterprises are seeing the most security attacks.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

Trusted Identities: Solving Fraud in Banking
sponsored by HID
WHITE PAPER: One of the biggest challenges facing banks today is how to provide secure and trusted services while substantially improving customer experience. Take a closer look at this white paper to reveal a holistic multi-channel identity and access management platform that can offer a better user experience and a higher level of mutual trust.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID

ActivID Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID

2017 Midyear Security Roundup: The Cost of Compromise
sponsored by TrendMicro
WHITE PAPER: In the first half of 2017 there have been 83 million total ransomware threats detected, and an average of 28 new families detected. Read this white paper to reveal ransomware attack costs and reviews of threat landscapes, so that enterprises can move forward to protect themselves against WannaCry, Petya and more.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Using Trend Micro's Hybrid Cloud Security Solution To Meet PCI DSS 3.2 Compliance
sponsored by TrendMicro
WHITE PAPER: After June 30, 2018, all entities must stop use of SSL/early TLS as a security control and use only secure versions of the protocol. Take an in-depth look at this white paper to uncover what you need to know in order to comply with PCI DDS 3.2.
Posted: 21 Sep 2017 | Published: 31 Aug 2017

TrendMicro

Enterprise Network Protection Against Cyberattacks Primer: Business Email Compromise
sponsored by TrendMicro
WHITE PAPER: Business email compromise (BEC) schemes have been increasingly successful, as they have become more pervasive. Take a look at this white paper to discover recommendations against BEC.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Integrate Cloud Faxing with your Multi-function Printers
sponsored by J2 Cloud Services
WHITE PAPER: This white paper discusses the immediate benefits of a cloud faxing model with the integration of a multi-function printer (MFP).
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

The Key to Advancing from Bot Management to Bot Security
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, learn about how you can better secure your IT environment by putting a common hacker tool, bots, to your own use, and how you can advance from simple bot management to bot security.
Posted: 21 Sep 2017 | Published: 03 Mar 2017

Akamai Technologies

AWS Security Fitness Guide
sponsored by evident.io
WHITE PAPER: Strengthen your cloud and combat the criminals. Read this white paper to reveal how to make your AWS environment less vulnerable to cyberattacks and threats.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

Cloud Workload Protection Automates AWS Cloud Security
sponsored by AWS - Symantec
WHITE PAPER: Deploying the automated Symantec Cloud Workload Protection (CWP) security solution on Amazon Web Services (AWS) can help your organization gain better visibility into your entire cloud environment, which often help business agility, reduces risk, and is cost-effective.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

AWS - Symantec

5 Ways to Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Analysts predict that 40% of all digital initiatives will fail due to mismanagement of identity-related requirements. Read this white paper to uncover 5 ways to ensure stronger authentication and identity management within your business.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Entrust, Inc.

Security Analytics: Putting Together an Effective Incident Response Plan
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, learn how to create and implement an effective incident response plan to detect security breaches and react before attacks wreak havoc on your network and reputation.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

Encrypted Traffic Analytics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn about the current state of encryption technology, predictions, and how you can leverage it to turn your network into an advanced security sensor.
Posted: 20 Sep 2017 | Published: 30 Jun 2017

Cisco Systems, Inc.

Data Breaches: Protect Your Organization with an Incident Response Program
sponsored by Cisco Systems, Inc.
WHITE PAPER: When a data breach occurs, your organization could be open to hackers and cybercriminals for up to 200 days. Thankfully, building a rapid incident response program isn't difficult, once you know how. This white paper outlines the critical process and major roles that can make that a reality.
Posted: 20 Sep 2017 | Published: 31 Dec 2015

Cisco Systems, Inc.

Next Generation Firewall Comparative Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report examines 11 next generation firewalls, evaluating for overall security, performance, and TCO. Take a look to see which providers lead the pack, which ones to avoid, and more.
Posted: 20 Sep 2017 | Published: 06 Jun 2017

Cisco Systems, Inc.

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon
1 - 25 of 1889 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement