IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityWhite Papers (View All Report Types)
151 - 175 of 1718 Matches Previous Page  | Next Page
Key IT Influencers in the Banking, Finance, and Insurance Industries in 2014
sponsored by Sungard
WHITE PAPER: Written in conjunction with industry leaders across Banking, Finance, and Insurance, the BFI Key Influencers Report sets out to promote conversation on the future of IT by talking to those industry professionals who help to shape it.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

IT Leaders Look Towards Implementing an Enterprise Mobility Strategy
sponsored by CA Technologies.
WHITE PAPER: The following survey detailed mobile information compiled from 1,300 senior IT decision makers from 21 different countries worldwide.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

CA Technologies.

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

The Future of Data Security: A Zero Trust Approach
sponsored by Digital Guardian
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

Digital Guardian

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

How to Stop Online and Mobile Banking Fraud
sponsored by iovation, Inc.
WHITE PAPER: This white paper reveals how to utilize a multilayered fraud prevention solution that doesn't sacrifice the overall customer experience.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

iovation, Inc.

English and French Collaboration Opens Education Cloud Portal to Many Countries
sponsored by CipherCloud
WHITE PAPER: This case study focuses on a UK educational organization who strives to create a secure portal in the cloud, compatible with global partners in order to access educational tools.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud

The 10-Minute Guide to Securing Email in the Cloud
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover a cloud encryption solution that caters to email security.
Posted: 23 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

7 Essential Steps to Securing Your Cloud Data
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover seven steps to take towards securing your cloud information.
Posted: 22 Sep 2014 | Published: 15 Oct 2013

CipherCloud

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Expose Hidden Threats with new SSL Decryption Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this informative white paper, discover how crucial new SSL decryption and inspection solutions can help organizations manage threats and sensitive data on their network.
Posted: 22 Sep 2014 | Published: 30 Nov 2013

Blue Coat Systems

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

5 Ways That  Data Analytics Help Healthcare Systems
sponsored by ExtraHop
WHITE PAPER: This white paper describes the benefits of the real-time healthcare system, and how one company is using wire data analytics to empower healthcare IT and provide unprecedented insight into all of an organization's wire data.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

ExtraHop

Why Next-Generation Firewalls Are Critical To Your Organization’s Network Security
sponsored by Icomm Technologies
WHITE PAPER: This in-depth whitepaper explores the next generation of firewalls, which can provide more effective advanced threat protection, enhanced application intelligence and control, and higher performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Transforming Resiliency and TCO
sponsored by Riverbed Technology, Inc.
WHITE PAPER: The branch office has always been a dilemma for IT teams.  They're a critical point of productivity and revenue, but come with a tremendous amount of overhead and risk.
Posted: 18 Sep 2014 | Published: 30 Apr 2014

Riverbed Technology, Inc.

Consolidating Remote Servers and Storage for Security, Efficiency
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out how to decouple storage from its server over any distance and be available as if it were local to applications at the edge in remote offices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Riverbed Technology, Inc.

The Balancing Act of Threat Intelligence and Risk
sponsored by CDW Corporation
WHITE PAPER: In this expert resource, get an inside at how risk management and threat intelligence affect global risk assessment, and how security officers can benefit from them.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Does Your SIEM Integrate Threat Data?
sponsored by CDW Corporation
WHITE PAPER: This expert eGuide explores how new technologies are integrating threat intelligence into SIEM solutions and enabling organizations to better prioritize security controls.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Threat-Aware Identity and Access Management for Mobile, Cloud, and Enterprise
sponsored by IBM
WHITE PAPER: This informative white paper presents new identity and access management (IAM) solutions with integrated threat prevention and analysis, increased granularity, and simplified user interfaces and dashboards.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

IBM

Anatomy of a Cyber-Attack: How Cyber Criminals Operate, and How You Can Stop Them
sponsored by Icomm Technologies
WHITE PAPER: In this informative resource, get an inside look the basic steps of a cyber-attack, from reconnaissance to intrusion to malware insertion, as well as new integrated security solutions that can help prevent these malicious activities from disrupting your business.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

Icomm Technologies

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
151 - 175 of 1718 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement