IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
1 - 25 of 1672 Matches Previous Page  |  Next Page
Case Study: Meeting Compliance with Secure Document Capture and Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how the VHA implemented secure document and print management solutions for improved security, compliance, and quality of care.
Posted: 27 Jul 2015 | Published: 31 Dec 2014

Nuance

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

Cyber Risk Report: Wide Range of Financials Targets Continue to Get Hit
sponsored by SurfWatch Labs
WHITE PAPER: This report uses data from recent financial sector attacks to discuss trends in financial sector security.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Cyber Risk Report: Data Breaches and the Healthcare Industry
sponsored by SurfWatch Labs
WHITE PAPER: This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Implementing an Intelligent Security Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll learn about Cisco's intelligent security architecture that spans endpoints, networks, security analytics, malware protection, and threat intelligence. Read on and discover how you can benefit from a more intelligent security system.
Posted: 20 Jul 2015 | Published: 27 Feb 2015

Cisco Systems, Inc.

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Securing your Enterprise in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper addresses the issue of cloud security and discusses how you can invest in the cloud without putting your business at risk.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Intelligence-Led Security: Develop a Concrete Plan
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper discusses the importance of proactive, intelligence-based security and gives suggestions for implementing it in your business.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

The Impact of Social Media On Information Security: What Every Company Needs To Know
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper can show you why security professionals need to pay attention to social media, and what you can do to implement secure social media practices in your organization.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

10 Steps for Protecting Executives Using Cyber Threat Intelligence
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper analyzes how social engineering and other technologies can help criminals to target your business's executives and assets, and it suggests ten ways you can protect them.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Connecting the Dots: How Threat Intelligence Uses its Data
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper demonstrates how truly effective threat intelligence systems work by presenting a case study where a threat intelligence system was used to uncover the source of an attack.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

Using the latest compilier technologies on z systems
sponsored by IBM
WHITE PAPER: This paper describes the features and benefits of IBM's strategic compilers specifically designed for z Systems. Read now for the advantages of staying current with the latest compiler technology.
Posted: 17 Jul 2015 | Published: 31 Mar 2015

IBM

Forrester Market Overview: Solutions for Cloud Security Management
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 16 Jul 2015 | Published: 02 Jun 2015

CloudPassage

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

Cloud Vs. Data Center: Inside Look Into Security
sponsored by CloudPassage
WHITE PAPER: This insightful 35-minute web seminar explores the origin of the myth that data is safer on premise than in the cloud and offers top requirements for security in the cloud.
Posted: 16 Jul 2015 | Published: 31 May 2015

CloudPassage

The Benefits of Cloud-Based Authentication
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper describes the benefits of adopting a cloud-based authentication infrastructure.
Posted: 16 Jul 2015 | Published: 31 Jan 2012

Symantec Corporation

Top 10 API Security Considerations
sponsored by Axway
WHITE PAPER: This white paper explores the top 10 considerations for security architects looking to tackle one of today's biggest security challenges: APIs.
Posted: 16 Jul 2015 | Published: 16 Mar 2015

Axway

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike
1 - 25 of 1672 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement