IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
151 - 175 of 1782 Matches Previous Page  |  Next Page
Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Dyn

DataSheet-SecondaryDNS2
sponsored by Dyn
WHITE PAPER: When DNS underperformance means a dent in revenue, customer satisfaction, and employee productivity, what can you do? Access this white paper to learn how to ensure your most critical applications remain available on the web and that end users reach those applications faster than with any other solution.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Dyn

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Modernize Cybersecurity with Hadoop Data Management and Analytics
sponsored by Cloudera
WHITE PAPER: Explore how to modernize your cybersecurity architecture, detect advanced threats faster, and accelerate threat mitigation with a data-driven strategy. Prepare your organization by leveraging big data, machine learning, and advanced analytics.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

Cloudera

How to Streamline Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Explore how vendor risk management has traditionally been handled, why traditional strategies alone are inadequate, and 3 ways to make vendor risk management more efficient.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

BitSight

Financial Technologies Protects its Network From Malware and Other Internet Threats
sponsored by ContentKeeper
WHITE PAPER: Financial Technologies needed help with preventing malware, spoofing, and denial of service attacks. Learn what they did so they can decode, inspect, and filter SSL-encrypted web traffic.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Why SSL Decryption is Critical for Today's Secure Web Gateways & 5 Keys to an Effective Solution
sponsored by ContentKeeper
WHITE PAPER: Discover why SSL decryption is a critical component for today's secure web gateways; and illustrated is a 5-point framework for evaluating these gateways to ensure you handle decryption successfully. Read on to also address the challenges associated with SSL decryption and how these created a big gap in effectiveness among solutions.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Vendor Analysis: 8 Cloud Security Gateway Providers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this Forrester report, discover a 23-criteria evaluation for cloud security gateway (CSG) providers that identifies, analyzes, and scores the top 8, allowing you to make an educated decision in choosing which one might be the best for your enterprise.
Posted: 03 Feb 2017 | Published: 15 Nov 2016

Symantec & Blue Coat Systems

Threat Intelligence: Your Secret Weapon
sponsored by AlienVault
WHITE PAPER: Within 24 months of a major data loss, 72% of businesses are forced to shut their doors. Learn how SMBs can gain the threat data, intelligence, experience, wisdom, expertise, and focused attention needed to identify and control attacks.
Posted: 03 Feb 2017 | Published: 21 Sep 2016

AlienVault

How to Strengthen Your Identity Infrastructure
sponsored by ExtraHop
WHITE PAPER: Few things are as essential to organizational health as identity infrastructure, which has greatly increased in importance because of new service models. Learn how to cut complexity and regain control of IT services, including identity systems, by unlocking the hidden value in data flowing through your network.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ExtraHop

7 Data Loss Prevention Suite Providers Compared
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this report, Forrester Research identified, researched, and analyzed 7 top data loss prevention providers. Learn how each provider measures up and discover how to make an educated decision in choosing which might be the best for your enterprise.
Posted: 02 Feb 2017 | Published: 08 Nov 2016

Symantec & Blue Coat Systems

How to Get More Signal, Less Noise for Your SIEM
sponsored by ExtraHop
WHITE PAPER: Uncover how adding wire data to your SIEM platforms can reduce the time spent by security teams in collecting and normalizing log data, minimize storage costs, and increase the effectiveness of your SIEM platform by providing better contextual information about threats and incidents.
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ExtraHop

Confronting Enterprise Security Risk: The State of Incident Response
sponsored by ServiceNow
WHITE PAPER: In this infographic, uncover research from ESG on the major causes of delays in incident response times and how to effectively counteract them, best practices to improve incident response, and more.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

An Essential Checklist for Your Security Response Solution
sponsored by ServiceNow
WHITE PAPER: Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

A New Paradigm for Identity Assurance
sponsored by RSA
WHITE PAPER: Learn how to take authentication to the next level. Discover how to determine the risk associated with the action a user is about to take, based on context gathered over time, continuously.
Posted: 30 Jan 2017 | Published: 31 Dec 2016

RSA

Choosing a Fax Solution Deployment Model
sponsored by OpenText
WHITE PAPER: Fax is still an important aspect of business communications. Most companies are choosing IT solutions based on deployment methods; do you want on-premises, hybrid, managed/hosted, or cloud? How do you choose?
Posted: 30 Jan 2017 | Published: 30 Dec 2016

OpenText

Status Quo Creates Security Risk
sponsored by ServiceNow
WHITE PAPER: Discover what 184 IT pros think are the most important factors that lead to incident response excellence, such as security and IT tool integration, the ability to know whether a security incident impacts a critical system and strong collaboration between the incident response and IT operations teams.
Posted: 27 Jan 2017 | Published: 29 Feb 2016

ServiceNow

Bringing IT and Security Together for Better Security Response
sponsored by ServiceNow
WHITE PAPER: Security response today is too slow and complex. Learn how to give your enterprise more efficient and timely security response, a streamlined path to remediation, and peace of mind that important assets are secure.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

ServiceNow

WP IFSW Global Network Survey results
sponsored by Fortinet, Inc.
WHITE PAPER: Fortinet conducted a survey of IT decision-makers from 10 countries around the world. They were asked specifically about the security challenges and decisions that they have to make and their areas of highest concern. Learn what security trends most concern top IT decision-makers
Posted: 09 Feb 2017 | Published: 22 Aug 2016

Fortinet, Inc.

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Office of the CIO - Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM
151 - 175 of 1782 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement