IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
126 - 150 of 1762 Matches Previous Page  |  Next Page
A Unified View for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Overcome the Limitations of Traditional Cloud Security for Office 365
sponsored by Palerra Inc.
WHITE PAPER: See how you can take a modern approach to securing your Office 365 data without the performance bottlenecks of traditional inline solutions. Uncover how your enterprise can increase visibility, improve threat detection, continuously monitor configuration and activities for compliance, as well as provide automated incident response and remediation.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Mobility is now a fact of life in every global enterprise, but mobile access is not without risk, and IT organizations can no longer afford to overlook these risks. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Spotlight on Insider Threats to Cloud Applications
sponsored by Palerra Inc.
WHITE PAPER: In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.

How to Quantify the Value of a Cloud Access Security Broker
sponsored by Palerra Inc.
WHITE PAPER: In this white paper uncover the reasons why Cloud Access Security Brokers are a crucial piece of any enterprise's security policy and how to make sure you're getting cloud security added into your budget.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Palerra Inc.

How to Make AWS Security as Agile and Effective as your AWS Environment
sponsored by Palerra Inc.
WHITE PAPER: Discover how to secure you AWS and bring it in line with the speed that your enterprise is now working at. Learn how automation is the key: conventional security is a roadblock to innovation and how organizations cannot afford the time it takes to detect and fix security defects at the end of a release cycle.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

Palerra Inc.

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Guide to Making The Cloud Secure
sponsored by BT
WHITE PAPER: Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

BT

Understanding the Session Data Framework
sponsored by Exabeam
WHITE PAPER: Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to advanced persistent threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Exabeam

Putting Military Strategy to Work Against Malicious Activity
sponsored by AlienVault
WHITE PAPER: Discover how your enterprise can put the OODA Loop (Observe, Orient, Decide, Act) philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breaches. Learn to observe a crisis from all angles, review events in the context of other network activity to establish a timeline, quickly implement remediation, and more.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

AlienVault

Building Success: Strengthen your Data Discovery and Classification
sponsored by IBM
WHITE PAPER: How can you strengthen your data foundation without compromising its integrity? This Forrester Research Report breaks down the struggle with data discovery and security. What are strong approaches to data classification that you can implement in your company moving forward? Read this report now and find out.
Posted: 25 Jul 2016 | Published: 01 Oct 2014

IBM

Assessing the Impact of Organizational Change on Financial Systems
sponsored by Infor
WHITE PAPER: In this white paper, discover how stovepipe systems and legacy applications on life-support hamper your ability to respond to change. Find out how you can prep for organizational change by building flexibility into your cloud and analytics strategies.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Using Finance Applications for Better Process Efficiencies and Data Accuracy
sponsored by Infor
WHITE PAPER: Discover how to identify and implement best-of-breed enterprise-level finance applications that improve process efficiencies and data accuracy, which Aberdeen Research reveals is increasingly critical to success.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Technology Platforms for Business Integration
sponsored by Infor
WHITE PAPER: Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Going global: Get up and running quickly no matter where you need to go
sponsored by Infor
WHITE PAPER: Dated financial systems tie you to old processes that can limit growth and increase risk. You must be agile and capable of supporting international growth, rather than hindering it. Explore how you can make your financial management system and processes an asset to global expansion, not an obstacle.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Tips for Streamlining Financial Processes and Providing Real Time Reporting
sponsored by Infor
WHITE PAPER: Discover how to address the growing gap between what a modern financial department should be able to and what they are actually able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Unified Security Management vs. SIEM: a Technical Comparison
sponsored by AlienVault
WHITE PAPER: Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

AlienVault

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Four Components of a Solid Mobile App Strategy
sponsored by IBM
WHITE PAPER: Discover the components that every mobile application strategy needs to succeed: discovery, scalability, sustainability, and security. Learn not only the importance of these four, but also how to attain them to truly benefit your organization.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM
126 - 150 of 1762 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement