IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
101 - 125 of 1677 Matches Previous Page  |  Next Page
When Disaster Strikes, Will Your BC/DR Plans Be Ready?
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores 4 critical disaster recovery assessments for your organization's cloud-based data and applications.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Limiting Widespread Data Access
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 24 Jun 2015 | Published: 29 Dec 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Understand the Threat Landscape
sponsored by IBM
WHITE PAPER: This infographic provides you with some essential statistics regarding the rising problem of cybercrime.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Strategy Considerations for Building a Security Operations Center
sponsored by IBM
WHITE PAPER: This white paper discusses the benefits of SOCs and gives essential advice on designing one that will work for you.
Posted: 24 Jun 2015 | Published: 31 Dec 2013

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine how much your organization would lose in a data breach.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: This white paper reveals the benefits of hardware encryption for strengthening data security across the enterprise while freeing up IT to take on other important data center tasks.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Micron Technology

Advance Your Cybersecurity Career with Unique Online Cybersecurity Graduate Program
sponsored by Mission Critical Institute
WHITE PAPER: This resource introduces the expert faculty in the online cybersecurity MBA program offered through Concordia St. Paul. Take a look to determine if these staff members could help you reach your further education goals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Mission Critical Institute

Overcome Three of Today's Biggest End User Pain Points
sponsored by Dell and Microsoft
WHITE PAPER: This resource reveals 3 of the most critical IT challenges centered around end users today, providing tips on addressing these pain points without spending too much time or money doing so.
Posted: 23 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft

5 Ways to Mobilize Windows Apps
sponsored by Citrix
WHITE PAPER: Learn how to boost employee productivity with Windows apps on demand. Meet the needs of today's modern workforce and empower your users with on-demand self-service to your enterprise apps.
Posted: 22 Jun 2015 | Published: 31 Jan 2014

Citrix

Corporate Data: A Protected Asset or a Ticking Time Bomb?
sponsored by Varonis
WHITE PAPER: Access this white paper for in-depth research into the growing risks and challenges to productivity that data growth and a lack of internal controls currently present for organizations of all sizes.
Posted: 19 Jun 2015 | Published: 31 Dec 2014

Varonis

Wireless Infrastructure Implementation: Best Practices
sponsored by Intel
WHITE PAPER: Access this white paper to discover best practices and best-known methods for architecting a wireless infrastructure within your organization. Follow these practices to help you quickly and efficiently replace wired LAN access services in your workspace with WLAN to provide employees with secure, reliable connections to mobile devices.
Posted: 19 Jun 2015 | Published: 28 Nov 2014

Intel

Obtain an MBA in Cybersecurity: Curriculum Overview
sponsored by Mission Critical Institute
WHITE PAPER: Employers are clamoring for job-ready cybersecurity professionals, specifically cyber pros who can apply the NIST Risk Management Framework to help protect their systems. Take a look at these online course offerings from Concordia University St. Paul to learn how you can become one of those much-needed security professionals.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

Mission Critical Institute

Gartner Market Guide for File Analysis Software
sponsored by Symantec | Veritas
WHITE PAPER: File analysis (FA) enables better information management decisions for unstructured data. Access this market guide for File Analysis software to read about use cases, recommendations, and vendor comparisons.
Posted: 18 Jun 2015 | Published: 23 Sep 2014

Symantec | Veritas

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 18 Jun 2015 | Published: 01 Jan 2015

NetApp

Your BT Agenda Demands A Hybrid Cloud Storage Strategy
sponsored by NetApp
WHITE PAPER: In this informative report issued by Forrester, discover how to launch a hybrid cloud storage strategy with greater payoff. Read on and uncover why current storage environments are limited, how to raise your infrastructure to the next level, and learn how to make your transition to hybrid cloud storage smooth and effective.
Posted: 18 Jun 2015 | Published: 08 Jan 2015

NetApp

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

NetApp

An Introduction to AWS Security
sponsored by Global Knowledge
WHITE PAPER: This white paper explains the most important aspects of AWS security and what that means to the enterprise.
Posted: 17 Jun 2015 | Published: 05 May 2015

Global Knowledge

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
101 - 125 of 1677 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement