IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
101 - 125 of 1774 Matches Previous Page  |  Next Page
eFax Corporate Unmasked: The Top 10 Fax Essential Questions Answered
sponsored by J2 Cloud Services
WHITE PAPER: In this online resource, find the answers for the top 10 questions to asked during eFax Corporate Webinar series over the past year.
Posted: 12 Sep 2017 | Published: 20 Jun 2017

J2 Cloud Services

3 Reasons Manufacturers Need to Upgrade to Cloud Faxing
sponsored by J2 Cloud Services
WHITE PAPER: Read this white paper to discover how your company can upgrade to a cloud faxing platform to give your manufacturing operation a competitive advantage.
Posted: 11 Sep 2017 | Published: 24 Jul 2017

J2 Cloud Services

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

2017 Threat Landscape Report
sponsored by Fortinet, Inc.
WHITE PAPER: Review what we've learned from the threats and exploitations attacking systems and networks across the globe in 2017 as a means for gaining critical insights into how you can better prepare your network for the cyber attacks of the future.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

Trust Must Be the Foundation of Your B2B Digital Ecosystem
sponsored by IBM
WHITE PAPER: Successful management of your digital business and ecosystems is not founded on technology, but trust. This 19 page Forrester report explores the fundamental role that trust plays in your digital transformation, focusing on the role of trust in the business-to-business context.
Posted: 11 Sep 2017 | Published: 29 Mar 2017

IBM

Security Investigations: The Importance of Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

5 strategies for modernizing security policy
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of proactive security policies, evolving compliance needs, and expanding corporate infrastructure have all made traditional security policies ineffective. Inside, discover 5 strategies for upgrading your existing policies to remediate these threats, and help make your decision makers confident in your cybersecurity again.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

So You've Been Breached: What to Do Next
sponsored by Armor
WHITE PAPER: When your system is breached by a malicious attack, it's no time to panic, it's time to act. Inside, discover the 5 steps you need to take to stop the exfiltration of data and return your system to normal operations with as minimal damage as possible.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Armor

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

What iOS 11 Means to the Enterprise
sponsored by MobileIron
WHITE PAPER: Apple is pursuing a stronger foothold in the enterprise market with many new features and capabilities released in iOS 11. This paper will focus on three key enterprise upgrades and the role of enterprise mobility management (EMM) solutions in managing and deploying some of these new capabilities.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

MobileIron

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How To Meet The New Mandates For European Consumer Data
sponsored by Ivanti
WHITE PAPER: Take an in-depth look at this white paper to reveal how you can meet GDPR requirements and strengthen your data protection strategy.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Ivanti

2017 Network Security Report
sponsored by Ixia
WHITE PAPER: Read this network security report to gain some insight into how the landscape has changed over the past year, and learn some tips as to how you can better secure your network.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Ixia

Top Areas to Look for in Data Protection Tools
sponsored by Dell EMC and Intel®
WHITE PAPER: We are entering an era where data is your most valuable asset. You need a data protection tool to ensure that your data stays yours. This white paper gives you 8 key focus areas to evaluate when making your data protection decision.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

Eliminating Access Blind Spots
sponsored by RSA
WHITE PAPER: 63% of data breaches involve compromised identities, according to the 2017 Verizon DBIR. Uncover how to enhance your security posture with multi-factor authentication that can mitigate potential risks prior to them causing trouble.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

6 Key Steps to Successful Identity Assurance
sponsored by RSA
WHITE PAPER: Uncover guidance on the six key elements to identity assurance and how to increase security while optimizing the end user's experience. Learn how to deliver access to users that's both convenient and secure.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

App-Centric Security — Meeting the Needs of the Modern Mobile Enterprise
sponsored by Blue Cedar
WHITE PAPER: IT security executives must constantly assess the best ways to secure mobile devices. Check out this white paper to learn about strategies to increase your mobile security posture.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Blue Cedar

Hosting: The Strategic Decision SMBs Should Take More Seriously
sponsored by Codero
WHITE PAPER: You need to invest in a hosting service to keep your SMB up and running, but which kind of service do you utilize? This white paper breaks down the process of making a hosting choice and discusses why you need to approach this as a strategic decision.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Codero

Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER: This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Bit9, Inc.
101 - 125 of 1774 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement