IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
101 - 125 of 1712 Matches Previous Page  |  Next Page
Reduce the Threat Attack Surface with Prescriptive and Actionable Data
sponsored by BMC
WHITE PAPER: What disconnected security and operations teams need is unprecedented visibility into their environment's threat stature. Learn how to bridge the so-called "SecOps gap" by prioritizing risks and reducing your overall attack surface.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

BMC

Breakthrough Security and Compliance Practices for the Digital Enterprise
sponsored by BMC
WHITE PAPER: A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

BMC

3 Steps to Taking Control of SaaS Apps
sponsored by Palo Alto Networks
WHITE PAPER: In this tech brief, you'll find a quick 3-step guide to get SaaS under control and prevent threats.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

Successfully Migrating Personnel Data from SAP ERP Human Capital Management to Employee Central
sponsored by Accenture
WHITE PAPER: Before migrating personnel data to SAP's Employee Central, adjustments and modifications are necessary to legacy SAP ERP HCM data. This report introduces a solution that converts data for migration that focuses on quality, consistency, and protection against risk and errors.
Posted: 30 Jun 2016 | Published: 31 Dec 2015

Accenture

Interoperability and the Cloud in Connected Health
sponsored by CloudMine
WHITE PAPER: Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.
Posted: 29 Jun 2016 | Published: 29 Jun 2016


A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


Accelerating the Building, Managing, and Deployment of Healhcare Apps
sponsored by CloudMine
WHITE PAPER: Discover how your healthcare organization can build and manage mobile and Web apps that ensure data is compliant and secure.
Posted: 28 Jun 2016 | Published: 04 Mar 2016


10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 28 Jun 2016 | Published: 15 Apr 2014

SIOS Technology Corp

Health Care Security Is Personal: Act Now to Protect Patient Care
sponsored by Optum
WHITE PAPER: In this white paper, learn how healthcare organizations can successfully manage vulnerabilities in today's ever-evolving threat landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.
Posted: 24 Jun 2016 | Published: 24 Jun 2016

Optum

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Survey Results: Wireless Security Trends
sponsored by Fortinet, Inc.
WHITE PAPER: Over half of 1,300 surveyed IT decision-makers revealed their preference for cloud-based wireless network management. Explore how to enable the segmentation of devices and access layers across wired/wireless networks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

The Advanced Threat Protection Buyer’s Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: Use the following checklist to help determine the strength of your security strategy. Access now and explore ways to make informed choices to move towards an integrated system of prevention, detection, and mitigation against advanced threats.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Advanced Threat Protection Buyer’s Guide
sponsored by Fortinet, Inc.
WHITE PAPER: To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

DX.com Achieves Immediate Results in Fraud Control
sponsored by CyberSource
WHITE PAPER: Discover how the popular online retailer DealeXtreme was able to automate and streamline fraud management operations. What could you learn to help reduce your fraud rate and save thousands in fraud avoidance?
Posted: 22 Jun 2016 | Published: 22 Jun 2016

CyberSource

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Secure Browser for Mobile Enterprise Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Protect and Distribute BYOD documents
sponsored by IBM MaaS360
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Secure Enterprise Email on Mobile Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Architecture Matters: Beyond Layered Security Approaches
sponsored by Palo Alto Networks
WHITE PAPER: The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Palo Alto Networks

Top Five Ways to Improve Cost Efficiencies And Reduce TCO With Desktop Virtualization
sponsored by Dell, Inc.
WHITE PAPER: Examine the top five ways you can improve cost efficiencies and reduce TCO with desktop virtualization. You'll also learn about the technologies that can provide the best opportunity to reduce costs and complexity.
Posted: 22 Jun 2016 | Published: 31 Dec 2015

Dell, Inc.

Take Your Life Back With Tools That Maximize Desktop Virtualization from the Data Center to the Endpoint
sponsored by Dell, Inc.
WHITE PAPER: Examine tools and platforms designed to maximize the value of virtual desktops – from the data center to the endpoint.
Posted: 22 Jun 2016 | Published: 31 Dec 2015

Dell, Inc.

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Stop Ransomware with Carbon Black
sponsored by Carbon Black
WHITE PAPER: Re-imaging security methods will never be the right solution to this problem. Learn about the tools imperative in preventing, detecting and remidiating randsomeware threats to your endpoints. Get greater visibility through continuous monitoring throughout your whole network.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black
101 - 125 of 1712 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement