IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
101 - 125 of 1687 Matches Previous Page  |  Next Page
Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Electronic Privacy Screens: Protect Your Data at the Source
sponsored by OptioLabs
WHITE PAPER: This white paper discusses how display security and breach detection solutions can protect against disclosures of information caused by over-the-shoulder observation and unattended workstations. Read on to discover the key features that you need to look for in a display security solution.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

OptioLabs

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Overcoming Data Sovereignty and Security Challenges with the Cloud
sponsored by PEER 1
WHITE PAPER: Access this valuable resource now and learn how to stay ahead of data residency laws, ensure you are storing data correctly, and safeguard your customer's data and ensure that its sovereignty remains intact.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

PEER 1

Top 5 IoT Security Questions for Manufacturers
sponsored by Microsoft
WHITE PAPER: The Internet of Things has introduced new security issues for manufacturers. This infographic reveals the top 5 essential questions you need to address in order to protect your connected devices and assets. Learn how to safely connect systems, devices, and other assets, as well as 4 other critical answers.
Posted: 31 Mar 2016 | Published: 31 Mar 2016

Microsoft

Overcome Security And Identity Management Challenges In Enterprise Mobility With The Right IT Infrastructure
sponsored by Microsoft
WHITE PAPER: Mobility is becoming an increasingly crucial tool in today's business landscape. Access this white paper to uncover the three key findings about risk management, security, and infrastructure that Forrester Research discovered during a study on enterprise mobility.
Posted: 31 Mar 2016 | Published: 30 Dec 2014

Microsoft

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn the results of an independent test of the Check Point 13500 Next Generation Threat Prevention Appliance with Threat Emulation Cloud Service R77.20.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Solving the Growing Complexities of Network Management: Network as a Service
sponsored by Rogers Communications, Inc.
WHITE PAPER: IT teams continue to struggle to keep up with new technologies and increasing bandwidth demands are only worsening the problem. Discover how to shift your IT departments focus from day-to-day maintenance toward productivity with Network as a Service.
Posted: 30 Mar 2016 | Published: 23 Mar 2016

Rogers Communications, Inc.

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Be More Secure With Micro-Segmentation
sponsored by VMware
WHITE PAPER: This short infographic specifically identifies one way that you can improve security within the confines of your data center. Explore how using micro-segmentation can help create partitions that will prevent attackers from rampaging through your data center.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

VMware

Stop Data Center Attacks Before They Happen
sponsored by VMware
WHITE PAPER: This short infographic discusses several strategies you can deploy to create better security in the interior bounds of your data center.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

VMware

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 29 Mar 2016 | Published: 23 Mar 2016

Aruba Networks

Q4 Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

MobileIron

Credit Union Infographic
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows you exactly why you need cyber threat intelligence to defend your sensitive data. With continuous monitoring technology, you'll learn about breaches the moment they occur and be able to mitigate risk accordingly.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Embracing User-Centric Workspaces with ZENworks
sponsored by MicroFocus
WHITE PAPER: Access this white paper to learn about a strategy that embraces and enables a user-centric workspace experience by extending five key capabilities to any user, device, and wired or wireless connection.
Posted: 28 Mar 2016 | Published: 30 Sep 2015

MicroFocus

How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.
Posted: 25 Mar 2016 | Published: 25 Mar 2016

Dell SecureWorks

Top 5 IT Challenges Facing Canadian Businesses
sponsored by Rogers Communications, Inc.
WHITE PAPER: Business success increasingly hinges on a company's ability to use new technology to drive innovation and improve operational efficiency. But IT leaders say their ability to advance the business is challenged. Read this brief white paper to learn about the IT challenges facing businesses today and why IT departments are wasting 200 hours per week.
Posted: 25 Mar 2016 | Published: 08 Mar 2016

Rogers Communications, Inc.

Make More Money with Enterprise Mobility Suite Part 1
sponsored by Microsoft
WHITE PAPER: Enterprise mobility suite (EMS) is the next tool that is going to be making its mark on the business landscape. This white paper will teach you the basics of EMS, who it will benefit, and pain points that are being addressed.
Posted: 25 Mar 2016 | Published: 27 Nov 2015

Microsoft

Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: This white paper explores the benefits of combining advanced network and endpoint detection technology with the right people, processes and intelligence for greater visibility of threats.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Dealing with Data Sovereignty in the Cloud Era
sponsored by VMware
WHITE PAPER: This white paper examines how you can gain back control of your data in the cloud era. Learn considerations for maintaining data sovereignty and security while future proofing your cloud strategy.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

VMware

Protect Against Zero-Day Attacks at the Every Level
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Check Point Software Technologies Ltd.

Overcome the Attacker Advantage with McAfee Endpoint Security 10
sponsored by Intel Security
WHITE PAPER: This white paper shows you how to respond and manage the threat defense lifecycle and a provide collaborative, extensive framework to reduce the complexity of conventional multivendor environments.
Posted: 25 Mar 2016 | Published: 31 Dec 2015

Intel Security
101 - 125 of 1687 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement