IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
126 - 150 of 1591 Matches Previous Page  |  Next Page
The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Case Study: Government Institution Gains Deeper Security Insight
sponsored by ThreatConnect
WHITE PAPER: In this case study, discover how a government institution obtained greater insight into security threats by implementing predictive defenses, threat intelligence, and more.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

ThreatConnect

The Essential Guide to Privileged Access Management
sponsored by FoxT
WHITE PAPER: In this white paper, you will discover how to effectively and efficiently control privileged UNIX and Linux accounts using centralized access management. Read on to secure privileged access across your corporation with granular authorization, and more.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

How to Restore Trust in Your Bank’s Email Channel
sponsored by Easy Solutions
WHITE PAPER: Access this white paper to learn how financial institutions can easily take advantage of DMARC to regain confidence in their email security.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Easy Solutions

Community Collaboration Enables Threat Detection
sponsored by ThreatConnect
WHITE PAPER: This case study describes a collaborative threat intelligence initiative undertaken by five separate organizations. Read on to discover how this collaborative intelligence group kept each other safe.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ThreatConnect

Defending Your Office 365 Data: Five Threats That Microsoft Can't Defend Against, But You Can
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses where Office3 365's built-in security capabilities fall short and how you can shore up your defenses. Gain the knowledge you need to stay secure while taking advantage of all Office 365 has to offer.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Datto, Inc.

Case Study: Ad Agency Makes Office 365 Secure
sponsored by BitGlass
WHITE PAPER: This case study discusses how a global ad agency found a solution to its Office 365 security concerns. Take a look to see what security measures this organization implemented and how you can do the same.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

The Frightening Fraud Landscape of 2016: Predictions from the Experts
sponsored by Easy Solutions
WHITE PAPER: This blog post gives you a quick breakdown of the kinds of cyber-fraud you need to look out for in 2016. Read on for an essential look into the future of online fraud.
Posted: 17 Dec 2015 | Published: 26 Nov 2015

Easy Solutions

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

New Recommendations From FFIEC on Extortion Attacks
sponsored by Easy Solutions
WHITE PAPER: Recently, the Federal Financial Institutions Examinations Council (FFIEC) issued a statement warning financial institutions of the cyber-risks they face and suggesting steps for avoiding those risks. Access this article for a summary of the most important information and guidelines to come out of the FFIEC statement.
Posted: 15 Dec 2015 | Published: 17 Nov 2015

Easy Solutions

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Case Study: Closing in on China's Unit 78020
sponsored by ThreatConnect
WHITE PAPER: This report explores how a Chinese cyber-espionage group known as Unit 78020 was discovered with an advanced intrusion analysis strategy.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

ESG lab report
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this ESG Lab review to learn more about its hands-on testing of the Juniper SRX5400 with a focus on the performance and scalability benefits of the next-generation I/O card (IOC-II) with the new Express Path capability.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Global Investment Bank Case Study
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this case study learn how Global Investment bank was able to eliminate hundreds of firewalls as it consolidated its data centers, resulting in stronger pereimeter security from advanced threats, at a significantly lower cost.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Securing the Datacenter from Advanced Threats
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource learn how datacenter security is now driven by highly sophisticated attackers, with targeted attacks on financial datacenter resources, customer reputation, and regulatory oversight. Security strategies are at the top of the agenda as CISOs remain focused on a multitude of enterprise risks.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

Juniper Networks, Inc.

Applying the "Diamond Model" of Threat Intelligence
sponsored by ThreatConnect
WHITE PAPER: This white paper takes a fun and humorous approach to breaking down how successful hacks occur and how they can be prevented.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

ThreatConnect

Mobile Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report examines how mobile workers perceive the risks associated with using sensitive data in public places and how they go about mitigating those risks.
Posted: 10 Dec 2015 | Published: 31 Dec 2012

OptioLabs

Special Report: Ensuring Cybersecurity in 2015
sponsored by Dimension Data
WHITE PAPER: This report looks at cybercrime data across industries and arrives at a disturbing conclusion: Organizations aren't paying enough attention to security basics.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

Dimension Data

Government Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report discusses the risks government agencies face when sensitive information is clearly displayed on a computer screen and gives suggestions for mitigating those risks.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

OptioLabs

Keep Your Patient Records Privacy
sponsored by OptioLabs
WHITE PAPER: This white paper explores the unique challenges of real-life data security and privacy in the healthcare industry. Read on to learn how you can keep all of your sensitive patient data private, even when it's displayed on a screen.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

OptioLabs

Case Study: Government Contractor Secures its Data with Enhanced Analytics
sponsored by Blue Coat Systems
WHITE PAPER: Access this case study to learn how a defense contractor cut down on security incidents and protected its sensitive assets by implementing an advanced security analytics platform.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Blue Coat Systems

Analytics Stop Advanced Threats in their Tracks
sponsored by Blue Coat Systems
WHITE PAPER: In this solution brief, you'll find relief knowing that breaches can be treated with a comprehensive approach that provides the intelligence and real-time analysis needed to see, understand, respond to and fortify the network against advanced threats.
Posted: 04 Dec 2015 | Published: 31 Dec 2014

Blue Coat Systems

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

It's Not You, It's Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper discusses why public cloud security is a shared responsibility and explains exactly what your role is when securing public cloud data.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

Alert Logic

Protect Against Email-Borne Threats
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how advanced threat protection can uncover and prioritize sophisticated attacks entering your organization through email. Discover how you can leverage targeted attack identification, detailed malware reporting, data correlation, a consolidated view of attacks across endpoints, networks, and email, and more.
Posted: 02 Dec 2015 | Published: 31 Oct 2015

Symantec Corporation
126 - 150 of 1591 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement