IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
151 - 175 of 1614 Matches Previous Page  |  Next Page
Today's Top DDoS Services Providers
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 09 Feb 2016 | Published: 22 Jul 2015

Imperva

Today's Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015

Imperva

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

ESG Brief: Threat Intel as part of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper shows you a new threat intelligence provider that offers a SaaS-based portal and team of intelligence operations analysts that can tailor threat intelligence to your needs.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to other growing problems. Access this resource now and learn to identify, quantify and mitigate risk throughout your network.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: Access this white paper and find out about the attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

BitSight

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Access this white paper and find out the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

A Fortune 200 Global Manufacturing Services Company
sponsored by Digital Guardian
WHITE PAPER: This white paper tells the success story of Jabil, a company struggling with data visibility issues.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

Are Energy and Utilities at Risk of a Major Breach?
sponsored by BitSight
WHITE PAPER: This white paper discusses the security performance of six key industry sectors.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

Digital Guardian Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Digital Guardian for Data Protection and Export Control Compliance
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn about context-aware protection and its capability to address a wide range of real-world cases for export controlled products and services.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian

Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.
Posted: 01 Feb 2016 | Published: 04 May 2015

Digital Guardian

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

Gartner Competitive Landscape: Data Loss Prevention Market
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This e-guide discusses potential obstacles to managing application security effectively and describes 5 steps for implementing risk-based application security management. Access now and obtain visibility into the state of application security across your enterprise with these tips.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

Stop Data Breaches with Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Examine how privileged access management can help stop data breaches. Learn now about a 3-step process for blocking attackers' attempts to carry out crimes in your organization.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

The State of Mobile Application Security (4th Edition)
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Key Considerations in Choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.
151 - 175 of 1614 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement