IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
1 - 25 of 1586 Matches Previous Page  |  Next Page
Survey Results: Mapping the Cloud Maturity Curve
sponsored by IBM
WHITE PAPER: This resource presents survey results on cloud maturity. Discover the 5 essential characteristics of high-maturity organizations, and learn about the biggest challenges that hold enterprises back from achieving cloud maturity.
Posted: 05 May 2016 | Published: 05 May 2016

IBM

Client Virtualization Solutions Made Simple
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: This white paper details how client virtualization strategies have made it simpler to procure, deploy, scale, and manage virtual desktops. Read on and you'll learn the benefits of deploying client virtualization strategies using hyper-converged systems.
Posted: 04 May 2016 | Published: 04 May 2016

Dell, Inc., Intel and VMware

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. This white paper details how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.
Posted: 03 May 2016 | Published: 03 May 2016

Dell, Inc., Intel and VMware

Client Virtualization for Higher Education Delivers Greater Mobility, Increased Security, and Savings
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: Today's students are accustomed to accessing data from any device, any location, at any time. But can their educational work styles be the same? This white paper details how client virtualization provides a simple way to seamlessly access data and apps across any device, enabling a mobile work style that improves student engagement and success.
Posted: 03 May 2016 | Published: 03 May 2016

Dell, Inc., Intel and VMware

SCIENCELOGIC: Unmatched Visibility into Open Source with Black Duck
sponsored by Black Duck Software
WHITE PAPER: This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improved efficiency and, most importantly, security by reviewing their code before their products hit the market and seeing exactly what they needed to change.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Building the Next-Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: Discover how you can construct an IP layer in order to facilitate a wide variety of new communications services, devices and applications. It also discusses managing this proliferation of new features utilizing the IP layer, despite ever-growing complexity.
Posted: 26 Apr 2016 | Published: 06 Apr 2016

Oracle Corporation

Communications Security: A Blueprint for Enterprise Session Border Controller Deployments
sponsored by Oracle Corporation
WHITE PAPER: Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.
Posted: 26 Apr 2016 | Published: 31 Aug 2015

Oracle Corporation

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

Why Application Delivery Matters in the Digital Economy
sponsored by Citrix
WHITE PAPER: Users are demanding instant access to apps and data from any device and any location. As a result, application delivery defines your organization's ability to generate growth, revenue and profit. This white paper highlights the four factors determining your success and the challenges surrounding them.
Posted: 20 Apr 2016 | Published: 30 Sep 2015

Citrix

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that you need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Visual Analytics: Easily Explore Data to Make Decisions You Can Trust
sponsored by TIBCO Software Inc.
WHITE PAPER: Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

TIBCO Software Inc.

How Secure Are Your Mobile Apps?
sponsored by Kony
WHITE PAPER: This e-book reveals the top 10 mobile security vulnerabilities and how to address them in the development process. Learn how to overcome weak server side controls, poor authentication and authorization, and much more.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

Kony

The Mobile Enterprise: Is Ease of Use Overriding Security?
sponsored by BlackBerry
WHITE PAPER: Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.
Posted: 15 Apr 2016 | Published: 31 Mar 2016

BlackBerry

Ditching Legacy Tokens
sponsored by BlackBerry
WHITE PAPER: While legacy tokens still hold 70% of the user authentication market, Gartner predicts a shift towards the phone as a token. Access this white paper to learn where legacy tokens are falling short and how emerging technologies go further by retaining all the security of legacy solutions while reducing costs and simplifying the end-user experience.
Posted: 14 Apr 2016 | Published: 31 Mar 2016

BlackBerry

Improve User Acquisition with Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

Gigya

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

The CIO’s Guide to EMM
sponsored by BlackBerry
WHITE PAPER: Developing and evolving a proper mobile strategy can spell the difference between success and failure in today's business landscape. Are you sure your mobile strategy is meeting the requirements for success in the evolving enterprise mobility landscape?
Posted: 14 Apr 2016 | Published: 04 Apr 2016

BlackBerry

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: This white paper makes it easy to reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now to learn and adapt to keep your critical information and infrastructure safer.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security
1 - 25 of 1586 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement