IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
1 - 25 of 1684 Matches Previous Page  |  Next Page
What's Driving the State of Cybersecurity
sponsored by Unisys
WHITE PAPER: The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.
Posted: 23 May 2016 | Published: 23 May 2016

Unisys

Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment
sponsored by Amazon Web Services
WHITE PAPER: Discover cloud security myths and a framework for assessing risk while comparing existing complex data center environments with new architectures in the cloud. You'll also learn three factors that contribute to cloud risk and security decisions.
Posted: 23 May 2016 | Published: 31 Jul 2015

Amazon Web Services

Building a Security Fabric for Today's Networks
sponsored by Fortinet, Inc.
WHITE PAPER: Build an enterprise security system that focuses on deploying defensive strategies through the entire enterprise, not just around the perimeter.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Protect Patient Data with Strong Desktop Security
sponsored by Aventura
WHITE PAPER: Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.
Posted: 20 May 2016 | Published: 20 May 2016

Aventura

Breaking Down the Benefits of Desktop Transformation
sponsored by VMware
WHITE PAPER: The future of mobility relies on the technology that it replaced; desktop computing. Desktop computing is undergoing a transformation that will couple it with the advances mobility has to offer. Read on to learn about the benefits this next-gen desktop is promising to deliver.
Posted: 20 May 2016 | Published: 29 Dec 2015

VMware

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: The presence of mobility in the workplace is going to continue its steady rise. We need to ensure that this is remains a benefit rather than a hinderance. Read on to learn about how end-users are the driving force in an ongoing mobility transformation and what this means for the future of mobility in the workplace.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Transforming the Desktop to Align with Today’s Mobile Reality
sponsored by VMware
WHITE PAPER: With the proliferation of mobile devices, have you stopped using your desktop? Does it seem outdated? The desktop is finally undergoing a next-generation transformation. Read on to learn about what the future of desktop computing will look like as it aligns with mobility.
Posted: 19 May 2016 | Published: 31 Jul 2015

VMware

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day. Mobility is taking over, but there are problems with security, compliance, and cost. Explore this infographic to learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Enterprise Mobility Management
sponsored by IBM MaaS360
WHITE PAPER: 28 percent of CIOs reported that their organizations do not have a mobile technology strategy. If they are to survive, they'll need to come up with one quick. See how enterprise mobility management has evolved over the past two decades and how to ensure that your organization doesn't fall behind.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Enable Better Decisions for Everyone in Your Organization
sponsored by Pyramid Analytics
WHITE PAPER: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 18 May 2016 | Published: 18 May 2016

Pyramid Analytics

Smarter Workspace Management: The IT Service Manager‘s Guide
sponsored by Matrix42
WHITE PAPER: IT service managers are tassked with providing effective service with limited vision and tight budget constraints. Uncover a solution that centralizes workspace management and provides the necessary vision and infrastructure without breaking the bank.
Posted: 17 May 2016 | Published: 31 Dec 2015

Matrix42

Scaling Security Alongside Your Business Growth
sponsored by Verizon
WHITE PAPER: See how you can extend your WAN while you grow, and do so without being concerned about opening up your enterprise to unseen vulnerability.
Posted: 17 May 2016 | Published: 31 Dec 2015

Verizon

Cloud Security: Advanced, Efficient, and Trusted
sponsored by Unisys
WHITE PAPER: Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.
Posted: 17 May 2016 | Published: 17 May 2016

Unisys

How One Security Expert is Exploring Modern Threats to Enterprises
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Organizations that deploy the right defenses, adopt the right governance, and train the right teams can achieve security in the evolving war over data. Discover ways to adapt your security strategy to new business models through a growing number of channels.
Posted: 17 May 2016 | Published: 17 May 2016

Check Point Software Technologies Ltd.

Application Awareness: The Critical Enabler in Virtualized Networks
sponsored by Ipoque
WHITE PAPER: Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.
Posted: 17 May 2016 | Published: 29 Apr 2016

Ipoque

E-Waste Is More Than Just Clutter – It’s A Security Issue
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

The Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.
Posted: 16 May 2016 | Published: 29 Feb 2016

Aruba Networks

Definitive Guide: Securing The Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.
Posted: 16 May 2016 | Published: 04 May 2016

Aruba Networks
1 - 25 of 1684 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement