IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
1 - 25 of 1686 Matches Previous Page  |  Next Page
How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Keep Systems Secure with Best Practices – and Best User Experience – in Mind
sponsored by IBM
WHITE PAPER: Gain a better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough, about 3 MMFA use-case scenarios, what market factors are driving MMFA adoption, and more.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

IBM

App Security: Shore up the Weaknesses in Your WAF
sponsored by tCell
WHITE PAPER: Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses, protecting your web applications and modernizing your security policy to stand firm against today's threats landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

tCell

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. Discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape in this expansive threat report.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

Perception vs. Reality: The Apps You Don't Know You're Using Are Vulnerable
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Tackle shadow data in this report on the perceptions versus the reality of how organizations really use cloud applications. Discover the massive backdoor they can often leave in your security policy, and what you can do to mitigate the risk.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

TOPICS:  Security
Symantec & Blue Coat Systems

HOW TO SOLVE DATA RESIDENCY, PRIVACY, AND SECURITY ISSUES IN THE CLOUD
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy not only cloud regulations by establishing data residency, addressing privacy issues, and keeping it secure, but also the need to control and manage your cloud presence.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

TOPICS:  Security
Symantec & Blue Coat Systems

Better Collaboration Tools to Satisfy Both Employees and IT
sponsored by Box
WHITE PAPER: Access this resource now to gain insight into how you can reinvent IT to enable your enterprise to collaborate effectively and deliver results without the traditional stigma of blocking collaboration instead of enabling it.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

Box

Complying with the European General Data Protection Regulation
sponsored by Quest
WHITE PAPER: Access this white paper now to learn what GDPR compliance means to your organization, what steps you must take to remain compliant, key GDPR provisions, and more.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Quest

10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 tips on how to keep your data safe once you adopt cloud services. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Symantec & Blue Coat Systems

DaaS Provider Evaluation Checklist
sponsored by Dizzion
WHITE PAPER: Companies are turning to virtual desktops to assist in supporting emerging mobility efforts. Desktop-as-a-service (DaaS) is being implemented virtual desktops rather than building their own VDI. Access this checklist to make sure that you're DaaS provider is meeting your business needs.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Dizzion

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 5 vital cloud data protection questions and answers in this white paper, covering your organization's first steps into migrating to the cloud all the way to dealing with long-term compliance issues.
Posted: 22 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

A Look at How Data Privacy Laws Impact Cloud Expansion in Germany
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

Putting a Next-Generation Firewall Through Its Paces
sponsored by Forcepoint
WHITE PAPER: See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.
Posted: 20 Feb 2017 | Published: 31 Dec 2015

Forcepoint

Realize the Promise of VDI with Flash Storage
sponsored by Pure Storage
WHITE PAPER: If you're considering a virtual desktop infrastructure (VDI) implementation, or have one that isn't living up to expectations, read this white paper to learn about 4 common problems areas that cause VDI performance issues and how actual end-users were able to solve them with flash storage.
Posted: 20 Feb 2017 | Published: 30 Dec 2016

Pure Storage

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately, learn what benefits you can expect for your business.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

10 Reasons Why Your IT Incidents Aren't Resolved Faster
sponsored by EverBridge Inc.
WHITE PAPER: When disaster strikes, one of the most important aspects of your recovery strategy is communication. Access this white paper to learn the top 10 reasons why your IT incidents are taking time to resolve and how improving your communication strategy helps prepare you to handle the unexpected.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

EverBridge Inc.

The security challenge for SMBs in a mobile world
sponsored by Microsoft
WHITE PAPER: In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to ensure that your mobile devices, data, and user identities are secured. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately learn what benefits you can expect for your business.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Dissecting the Spora Ransomware: What Makes This Malware Tick?
sponsored by Booz Allen Hamilton
WHITE PAPER: Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

An In-depth look at "Satan": Ransomware-as-a-Service Malware on Deep Web
sponsored by Booz Allen Hamilton
WHITE PAPER: Get a first-hand, in-depth look at how the ransomware-as-a-service (RaaS) malware "Satan" is being promoted on the deep web.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

How to Uncover Threats in SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

A10 Networks

Cloud Managed Services: A Comparison Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this white paper to learn what to ask for in a managed cloud service providers. Use this as a guide to understand what you need, why you need it, and how to go about choosing the right partner.
Posted: 14 Feb 2017 | Published: 30 Jun 2016

Hewlett-Packard Enterprise
1 - 25 of 1686 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement