IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
1 - 25 of 1681 Matches Previous Page  |  Next Page
The Cloud is Only as Secure as its Provider
sponsored by QTS
WHITE PAPER: In this white paper, discover the top concerns for CIOs surrounding cloud computing, and explore the challenges many businesses face when moving to cloud.
Posted: 29 Mar 2015 | Published: 29 Mar 2015

QTS

Cybercrime 101
sponsored by Global Knowledge
WHITE PAPER: Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Global Knowledge

Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Access this white paper to learn about how flash storage not only provides the performance necessary to run these applications, but also the security to prevent data breaches.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

IBM

How Can Application Virtualization Help Out Your Mobility Strategy?
sponsored by Citrix
WHITE PAPER: This white paper introduces a leading application virtualization solution that can deliver service to users anywhere on any device.
Posted: 26 Mar 2015 | Published: 30 Nov 2014

Citrix

Application-Centric Infrastructure Streamlines IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces a network infrastructure that combines most needs into one place for a more efficient and more effective IT.
Posted: 26 Mar 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline and enhance your risk management strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

Citrix NetScaler: A Foundation for Next-Gen Datacenter Security
sponsored by Citrix
WHITE PAPER: This white paper reveals how NetScaler is meeting modern demands for more robust datacenter security.
Posted: 25 Mar 2015 | Published: 01 Sep 2012

Citrix

Executive breach response playbook
sponsored by Hewlett-Packard Limited
WHITE PAPER: Download this white paper for a step-by-step guide on how to lead your organization through a crisis with comprehensive planning, sound leadership, and more.
Posted: 25 Mar 2015 | Published: 31 Jan 2015

Hewlett-Packard Limited

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: This survey reveals how IT professionals view effective executive involvement in threat mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worse threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

How to Ensure Your IP Address Management is Working Properly
sponsored by Efficientip
WHITE PAPER: Access this white paper for several guidelines designed to make your network's IP addressing environment as manageable, flexible, secure, reliable and responsive as possible.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Efficientip

Everbridge Case Study: Optimizing Network Security Management
sponsored by F5 Networks
WHITE PAPER: Read more to learn how you can boost your network security and efficiency while also cutting costs.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

F5 Networks

A Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Download this paper to discover the pros and cons of an SIEM platform and to determine if this is the one that meets your needs.
Posted: 23 Mar 2015 | Published: 30 Sep 2014

IBM

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Case Study: Finding Document Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Mitigate Your Biggest Security Risk: Business Users
sponsored by ObserveIT
WHITE PAPER: Do you know who poses the greatest security risk to your organization? Surprisingly, the answer is people closer than you think: your business users. In this white paper, discover five reasons why business users with access to critical applications are so risky.
Posted: 21 Mar 2015 | Published: 21 Mar 2015

ObserveIT

Keep Your Customers Safe from Phishing
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper presents one possible solution to the problem of phishing and helps you ensure the safety of your customers' data.
Posted: 20 Mar 2015 | Published: 31 Dec 2013

Symantec Corporation

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Case Study: Global 500 Company Integrates Security and Application Development
sponsored by Veracode, Inc.
WHITE PAPER: A global 500 company faced the challenge of balancing fast application development with security. This case study describes how they met that challenge.
Posted: 20 Mar 2015 | Published: 01 Jan 2015

Veracode, Inc.

Windows Server 2003: Why You Should Get Current
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: Access this white paper to discover helpful tips on a successful Windows Server 2003 migration, including two migration options that are available to customers and how to develop a strategy for mitigating and modernizing existing Windows Server 2003 and related application installations.
Posted: 20 Mar 2015 | Published: 31 Jul 2014

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM
1 - 25 of 1681 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement