IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
101 - 125 of 1784 Matches Previous Page  |  Next Page
Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

GDPR and Citrix ShareFile
sponsored by Citrix
WHITE PAPER: The General Data Protection Regulation (GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Posted: 18 Jul 2017 | Published: 27 Dec 2016

Citrix

The Case for Cloud-Based IAM
sponsored by OneLogin
WHITE PAPER: What's the future of IAM? Is it on the cloud? What are the benefits? IAM expert David Meyer discusses why traditional IAM is no longer sufficient for enterprises today and how cloud-based IAM can meet your organization's security needs.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

OneLogin

IAM: On-Premises vs. IDaaS Delivery
sponsored by OneLogin
WHITE PAPER: Which is better for your organization: on-premises IAM or IDaaS? This Gartner report can provide valuable insight into which one may be best for you.
Posted: 18 Jul 2017 | Published: 18 Jul 2016

OneLogin

7 Ways to Improve Your Security Incident Response
sponsored by Rsam
WHITE PAPER: There are many reasons incident response programs may not succeed, including lack of process maturity and poor data quality. Uncover 7 key concepts for implementing a successful incident response platform.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce
sponsored by Citrix
WHITE PAPER: When your business doesn't provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies.
Posted: 17 Jul 2017 | Published: 31 May 2017

Citrix

3 Ways EFSS Enables Secure Content Collaboration
sponsored by Citrix
WHITE PAPER: The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Citrix

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec & Blue Coat Systems

Your Shadow IT Discovery Best Practices Guide
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to guide your organization through the process of safely adopting cloud apps and services, mitigating the influence of shadow IT and reducing your security risk.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

How to Ensure Secure and Compliant Cloud App Use
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud applications are becoming more vital to business, but securing them can be tricky. Discover 6 key guidelines to maximize the effectiveness of your CASB to help you remain secure and compliant with cloud apps.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Improve Your Cloud Security Without Adding Complexity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to improve your cloud security without adding complexity by learning how to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Cloud Security: 6 Tips to Ensure Critical Data is Secure
sponsored by WinMagic
WHITE PAPER: With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.
Posted: 13 Jul 2017 | Published: 06 Jul 2017

WinMagic

Mobile Security in Healthcare: Ensure HIPAA Compliance
sponsored by BlackBerry
WHITE PAPER: Your mobile strategy requires an end-to-end solution for transmitting, managing, and storing data in compliance with HIPAA. Discover how to implement mobility in your healthcare organization and remain HIPAA compliant.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

BlackBerry

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin

How to Gain Complete Protection for Cloud Workloads
sponsored by TrendMicro
WHITE PAPER: According to the Ponemon Institute, 36% of organizations' total IT and data processing requirements are met using cloud resources. Learn how to gain clear control over your cloud security and complete protection for cloud workloads.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Leaders need to secure the aspects of the cloud they can control – identity and information – to protect their intellectual property. Access this white paper to learn the three keys to maintaining control of data security in the cloud.
Posted: 13 Jul 2017 | Published: 31 Jul 2015

Symantec & Blue Coat Systems

Encryption in the Cloud. Rewriting the Rules of Data Security
sponsored by WinMagic
WHITE PAPER: Keeping compliant and secure on the cloud are major concerns for enterprises today. Learn how to protect all of your virtualized and Cloud IaaS workloads against major threats with encryption.
Posted: 11 Jul 2017 | Published: 07 Jul 2017

WinMagic

Cloud Encryption: Whose Responsibility Is It Really?
sponsored by WinMagic
WHITE PAPER: In this white paper learn how you can confidently keep enjoying the unrivalled TCO and flex that cloud encryption offers while keeping your critical corporate data secure and compliant.
Posted: 11 Jul 2017 | Published: 07 Jul 2017

WinMagic

CEO Fraud Prevention Manual
sponsored by KnowBe4
WHITE PAPER: This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

KnowBe4

DaaS Provider Evaluation Checklist
sponsored by Dizzion
WHITE PAPER: With so many options and vendors out there, researching desktop as a service (DaaS) can be a time consuming task. What questions should you ask? What should you be evaluating? Download this checklist to gain a real-world, hands-on tool to use to make the information gathering process easier.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Dizzion

4 Major Threats to Mobile Security
sponsored by MobileIron
WHITE PAPER: Learn about 4 top malware threats to mobile security, how they work, what impact they could have on your business if you're infected, and how to detect and mitigate each strain.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

MobileIron

The Argument for a New IT Security Architecture
sponsored by Citrix
WHITE PAPER: Disruptive technologies, cybercrime and compliance are creating risks enterprises have never encountered before. In this Ponemon Institute report, discover how to rethink your IT security framework to improve your security posture and reduce risk.
Posted: 11 Jul 2017 | Published: 31 May 2017

Citrix
101 - 125 of 1784 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement