IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
126 - 150 of 1785 Matches Previous Page  |  Next Page
Putting a Next-Generation Firewall Through Its Paces
sponsored by Forcepoint
WHITE PAPER: See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability, and total cost of ownership.
Posted: 20 Feb 2017 | Published: 31 Dec 2015

Forcepoint

Realize the Promise of VDI with Flash Storage
sponsored by Pure Storage
WHITE PAPER: If you're considering a virtual desktop infrastructure (VDI) implementation, or have one that isn't living up to expectations, read this white paper to learn about 4 common problems areas that cause VDI performance issues and how actual end-users were able to solve them with flash storage.
Posted: 20 Feb 2017 | Published: 30 Dec 2016

Pure Storage

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: The increased workload of security devices as they analyze traffic can strain computing resources. Learn how NGFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

10 Reasons Why Your IT Incidents Aren't Resolved Faster
sponsored by EverBridge Inc.
WHITE PAPER: When disaster strikes, one of the most important aspects of your recovery strategy is communication. Access this white paper to learn the top 10 reasons why your IT incidents are taking time to resolve and how improving your communication strategy helps prepare you to handle the unexpected.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

EverBridge Inc.

IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment
sponsored by Forcepoint
WHITE PAPER: In this report excerpt learn about the email security market, how it is experiencing an influx of new features to deal with adapting threats, and how Forcepoint has been named a leader in the market.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Forcepoint

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this Radicati Market Quadrant research report, uncover a detailed breakdown of how individual vendors fit within the advanced-persistent threat (APT) market and who the top players, trail blazers, specialists, and mature players are.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Dissecting the Spora Ransomware: What Makes This Malware Tick?
sponsored by Booz Allen Hamilton
WHITE PAPER: Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

An In-depth look at "Satan": Ransomware-as-a-Service Malware on Deep Web
sponsored by Booz Allen Hamilton
WHITE PAPER: Get a first-hand, in-depth look at how the ransomware-as-a-service (RaaS) malware "Satan" is being promoted on the deep web.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

How to Uncover Threats in SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

A10 Networks

Cloud Managed Services: A Comparison Guide
sponsored by IBM
WHITE PAPER: Access this white paper to learn what to ask for in a managed cloud service providers. Use this as a guide to understand what you need, why you need it, and how to go about choosing the right partner.
Posted: 14 Feb 2017 | Published: 30 Jun 2016

IBM

Agility meets Control: 3 Ways to Boost Security in the Cloud
sponsored by Microsoft
WHITE PAPER: Explore how to implement modern, cloud-capable security strategies that empower rather than hinder development and innovation. Find out 3 ways to boost security in the cloud with Windows Server 2016, starting with your OS, your data center and critical workloads, business apps, and more.
Posted: 14 Feb 2017 | Published: 31 Dec 2016

Microsoft

Vendor Risk Management Checklist
sponsored by ModoModo
WHITE PAPER: As outsourcing becomes the norm with more and more aspects of an enterprise's operations managed by third parties, these organizations expose themselves to a growing amount of shared risk. The following checklist can serve as a guide to help your organization mitigate vendor risk.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

How to Implement Practical Security Assessments
sponsored by ModoModo
WHITE PAPER: This white paper covers ways to gain perspective about your security based on developing a proper and balanced perspective in the rather oblique world of assessments.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

Finding a Better Metaphor, Staring into the Cloud, and What to Expect at RSA 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: This white paper explores the security challenges of cloud and IoT, and examines which topics dominated the 2017 RSA conference. Find out which security paradigms are shifting and learn how security pros are putting a new spin on old topics, like how analytics and intelligence are increasing their role in threat and event management.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton

Cyber Threat Analysis For 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: Access this guide to uncover a number of vital security predictions for 2017, including: enterprise environments providing fertile territory for ransomware operators, how IoT can enable DDoS attacks, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton

Multi-DNS Patterns: Deliver Better Performance, Security, and Reliability
sponsored by Dyn
WHITE PAPER: Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Discover 3 approaches to multi-DNS that can help deliver consistent, high-quality user experiences and mitigate outage risks.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Dyn

Leverage On-Demand Testing with Vulnerability Analytics
sponsored by IBM
WHITE PAPER: Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

IBM

The Best of Both Worlds: Using a Hybrid Approach to Boost IT Agility
sponsored by HPE and Intel®
WHITE PAPER: Can't choose between on-premise and cloud infrastructures? Get both. Access this white paper to review the conversation surrounding hybrid IT and how it addresses SMBs' concerns about their current IT infrastructures.
Posted: 13 Feb 2017 | Published: 31 Aug 2016

HPE and Intel®

Understanding and Overcoming Cloud Security Threats
sponsored by Peak10
WHITE PAPER: The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Peak10

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

Details on Newly Observed GhostAdmin Botnet
sponsored by Booz Allen Hamilton
WHITE PAPER: Gain a rare look at the beginnings of a malware threat and learn how Booz Allen Hamilton discovered and identified indicators of compromise for the newly observed GhostAdmin malware and how to protect your enterprise from falling prey to it.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Booz Allen Hamilton
126 - 150 of 1785 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement