IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
126 - 150 of 1726 Matches Previous Page  |  Next Page
Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

The Different Types of Cyber-Attacks and How to Prevent Them
sponsored by SonicWall
WHITE PAPER: This e-book explores four primary strategies cybercriminals use to infiltrate your network, and best practices for countering them. Learn how you can successfully combat common cyber-attacks ransomware, encrypted attacks and more.
Posted: 10 Mar 2017 | Published: 30 Dec 2016

SonicWall

SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race
sponsored by SonicWall
WHITE PAPER: This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.
Posted: 10 Mar 2017 | Published: 31 Jan 2017

SonicWall

Hackers Have a Plan to Get to Your Privileged Accounts
sponsored by One Identity
WHITE PAPER: Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: Learn how to properly secure, manage, and govern the accounts belonging to "superusers" – privileged accounts.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

The Low hanging fruit of IAM – three fundamental things you should be doing
sponsored by One Identity
WHITE PAPER: Learn how to address where to begin with IAM and security solutions, how they are multi-layered, and 3 IAM best practices to ensure your enterprise has a strong security posture.
Posted: 10 Mar 2017 | Published: 31 Dec 2016

One Identity

Your Guide to Managed Security for Amazon Web Services
sponsored by Armor
WHITE PAPER: Uncover the tools you need to regain control and visibility, reduce costs, and ensure security down to the core of your AWS usage.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Armor

How Shadow IT Became Key to Multi-Cloud Strategies
sponsored by Armor
WHITE PAPER: Learn how your organization's workforce has created a web of shadow IT and how you can harness it to enjoy the benefits and control the risks to launch a successful multi-cloud strategy.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Euronext Euronext’s recent IPO was a catalyst to create a coherent security environment across the new business.
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The point of security isn't just safeguarding data, mitigating loss, and providing ROI. Ultimately it's about providing peace of mind. Discover how Euronext was able to go beyond standard virus and scanning capability, reduce threat risk across their technology estate, improve threat visibility, mitigation and resolution action , and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Keeping Your Private Data Secure
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to protect your organization with various types of encryption, allowing your data to possibly stay safe even in the event of a breach.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Symantec & Blue Coat Systems

Securing Your Amazon Web Services Environment
sponsored by Armor
WHITE PAPER: Learn how to make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization's situation and needs.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

2017 Report: Capabilities and Maturity of Cyber Defense Organizations
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive report learn the minutiae of the current threat landscape, discover how there has never been a stronger connection between security initiatives and business goals, and what trends are driving the evolution of security.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Hewlett Packard Enterprise

Ensure your Move to Azure is Secure
sponsored by Armor
WHITE PAPER: Learn how to ensure that your organization's data, applications, and operating systems are securely deployed, monitored and maintained in Azure's IaaS environment.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Symantec Data Loss Prevention Solution
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Sensitive information is leaving the safety of your corporate network and flying into the cloud where traditional security approaches hold little sway. Learn how to manage and protect your information in the modern, cloud-driven environment.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Symantec & Blue Coat Systems

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017

IBM

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

How to Seamlessly Integrate Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.
Posted: 08 Mar 2017 | Published: 30 Sep 2016

Veracode, Inc.

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

Fighting the Latest Evolution of Money Laundering
sponsored by BAE Systems
WHITE PAPER: This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.
Posted: 08 Mar 2017 | Published: 31 Dec 2016

BAE Systems

The Big Bang Theory – how Mobile Device Management exploded to include devices, apps and content
sponsored by IBM
WHITE PAPER: Download this white paper to discover an enterprise mobility management platform that delivers comprehensive management with strong security controls across users, devices, apps and content to support any mobile deployment.
Posted: 07 Mar 2017 | Published: 06 Mar 2017

IBM

6 Steps to Proactive Cybersecurity Protection
sponsored by BAE Systems
WHITE PAPER: Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Why The Changing Nature of Beneficial Ownership Compliance is Important to You
sponsored by BAE Systems
WHITE PAPER: Use this white paper to learn the importance of managing and reporting your company's beneficial owners, as well as some initial steps you can take towards achieving beneficial ownership compliance.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Advanced Detection of Existing, New and Evolving Cybersecurity Threats
sponsored by BAE Systems
WHITE PAPER: According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch
126 - 150 of 1726 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement