IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityWhite Papers (View All Report Types)
101 - 125 of 1705 Matches Previous Page  | Next Page
Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Reducing the Reputational Impact of Data Breaches and Cyber-Attacks
sponsored by IBM
WHITE PAPER: This informative white paper explores the top strategies and techniques to protect your reputation by increasing business resilience and IT security across the enterprise.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

IBM

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Keep Your Endpoints Secure with Customizable Advanced Threat Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This informative resource outlines a new approach to endpoint security that can provide your organization with real-time visibility and increased protection against modern cyber-attacks, including advanced persistent threats (APTs).
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Building the business case for continuity and resiliency
sponsored by IBM
WHITE PAPER: In this resource, discover what IT professionals are saying about IT risk management strategies and how you can add depth and breadth to your own business.
Posted: 25 Aug 2014 | Published: 30 Jan 2014

IBM

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab

Breaking Down Cloud Archiving Myths
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the misinformation and misconceptions that are preventing many organizations from taking full advantage of the cloud.
Posted: 25 Aug 2014 | Published: 21 Aug 2013

Hewlett-Packard Company

Six steps to effective reputational and IT Risk Management
sponsored by IBM
WHITE PAPER: This resource highlights 6 tips to effectively manage reputational and IT risk in order to protect and enhance brand value and competitive standing.
Posted: 25 Aug 2014 | Published: 30 Sep 2013

IBM

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Mobile Security: Threats and Countermeasures
sponsored by MobileIron
WHITE PAPER: Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

MobileIron

Ponemon Report: The Real Cost of Cyber Crime in 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this Poenmon study to discover the average cost to businesses of cyber crime, and how organizations can take steps to reduce security risks and costs.
Posted: 22 Aug 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM

7 Essential Practices for Business Continuity Management
sponsored by IBM
WHITE PAPER: In this informative white paper, uncover a tested approach to expanding Business Continuity Management into an integrated, enterprise-wide program.
Posted: 22 Aug 2014 | Published: 30 Apr 2014

IBM

Understaffed And At Risk: Today’s IT Security Department
sponsored by HP and Intel
WHITE PAPER: This Ponemon study explores how organizations can most effectively hire and retain expert security staff in order to help achieve business goals.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

HP and Intel

Finding the Security Balance for Virtual Environments
sponsored by Kaspersky Lab
WHITE PAPER: This in-depth white paper will help you identify the right security approach for your virtual environment that won't be a drain your system's performance.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Put Security on the Agenda: Aligning IT Security with Business Goals
sponsored by Kaspersky Lab
WHITE PAPER: Read this in-depth guide to discover new integrated systems management and mobile device management solutions that could help your organization enhance its existing security plan.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

4 Steps to Effective Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, learn about a new security event information management solution that enables faster event processing and real-time security information.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains the challenges regarding Web security, and explores a solution with a durable network-based security architecture that is designed to protect against malicious threats.
Posted: 21 Aug 2014 | Published: 01 May 2013

Cisco Systems, Inc.

How Midsize Businesses Can Defend Against Enterprise-Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the security posture of midsize companies and how effective they are, as well as the four most important industry insights into midsize company security.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Keep Up With the Evolving Threat Landscape to Protect Email
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to mitigate risk associated with email within your organization and take on the challenge of the evolving threat landscape.
Posted: 20 Aug 2014 | Published: 01 Jun 2013

Cisco Systems, Inc.

Get the Most Value Out of Network Security
sponsored by HP and Intel
WHITE PAPER: This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.
Posted: 20 Aug 2014 | Published: 01 Dec 2014

HP and Intel
101 - 125 of 1705 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement