IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
26 - 50 of 1770 Matches Previous Page  |  Next Page
Threat Research Report: The Anatomy Of A Ransomware Attack
sponsored by Exabeam
WHITE PAPER: This extensive research report explains ransomware behavior and how you can protect your network. Inside you will gain access to a ransomware cheat sheet and a glossary of security terms.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Exabeam

The Need for a New IT Security Architecture
sponsored by Citrix
WHITE PAPER: In a recent Ponemon Institute survey, 399 IT and IT security practitioners in the UK were asked about trends in IT security risks and why policies need to evolve in order to deal with threats from disruptive technologies. Access now to uncover their take on these topics and more.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Citrix

How to Mitigate IP Theft by Departing Employees
sponsored by Veriato, Inc.
WHITE PAPER: The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

How User Monitoring Helps Protect Against
sponsored by Veriato, Inc.
WHITE PAPER: In this white paper you'll learn why simply trusting your employees not to abuse their powers is not enough, and how this user and entity behavior analytics (UEBA) platform paired with user activity monitoring (UAM) can help create the secure environment you need.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

The Ransomware Survival Handbook
sponsored by Barkly
WHITE PAPER: This handbook will teach you everything you need to know about preventing, responding to, and recovering from a ransomware attack. From exploring what email documents it hides in, to a 4-step guide to bouncing back after ransomware infects your system, learn it all inside.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Your 3 Step Cybersecurity Checklist
sponsored by Barkly
WHITE PAPER: IT security is a shifting landscape, and your policy needs to be ready to meet today's threats, as well as those that are still evolving. Find a 3-step checklist designed to help you craft a robust and adaptive security policy.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

80/20: The New and Not-So New World of OT and IoT Security
sponsored by Atos
WHITE PAPER: This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.
Posted: 02 Aug 2017 | Published: 26 Jul 2017

Atos

Security Investigation and Rapid Response with AWS
sponsored by Splunk
WHITE PAPER: Cloud is always seen as a security weakpoint--but what if you could turn the cloud to your advantage? By utilizing an analytics-driven approach to security, you can turn your AWS cloud deployments into a security tool. Take a minute to read this white paper and see how you can turn your weakness into an advantage.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

Splunk

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

Mastering Your Career In Data Security
sponsored by Virginia Tech Online
WHITE PAPER: Data breaches are costly – in revenue and reputation – and organizations are actively looking for talented professionals who can help protect data stores. Learn what issues are keeping CIOs up at night, and the career opportunities available in this growing field.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Virginia Tech Online

Prepare Your Business For The General Data Protection Regulation (GDPR)
sponsored by Lepide Software
WHITE PAPER: Issues relating to data privacy continue to hit the headlines on a regularbasis. The European Union have introduced the General DataProtection Regulation (GDPR), which is designed to replace the currentData Protection Directive (DPD). Learn about key considerations you'll need to consider when preparing for the GDPR.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Lepide Software

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Splunk

Dynamic Authentication
sponsored by iovation, Inc.
WHITE PAPER: It's hard to run a secure business if you can't authenticate the identities of your online users. Learn how Dynamic Authentication can help bridge the gap, unifying both user experience and security needs.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

iovation, Inc.

Security Hygiene & Other Cybersecurity Tips That Could Save Your Business
sponsored by AdvizeX Technologies
WHITE PAPER: Cybercriminals are focused on your data, should you be too? Access this white paper to learn how you can create a solid foundation to protect your organization and customers.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

TOPICS:  Security
AdvizeX Technologies

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

How LepideAuditor Helps You Detect and Prevent Ransomware Spread
sponsored by Lepide Software
WHITE PAPER: Learn about the important role of security audits in defending against increasingly complex ransomware attacks. Discover how to get real-time insights into changes in the configuration of systems like Active Directory, Exchange Server, and NetApp Filers.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

HyperConvergence or Hyper-Security? What's Right for Your Enterprise?
sponsored by HyTrust
WHITE PAPER: To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

HyTrust

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

The Smart, Secure Cloud for the UK
sponsored by Google Cloud
WHITE PAPER: This document gives an overview of how security is designed into Google's technical infrastructure. Read on to learn about the lengths to which Google has gone to provide a level of security that you need in order to have confidence in your cloud deployments.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Google Cloud

Enable Visibility and Protection in the Cloud-Connected Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.
Posted: 26 Jul 2017 | Published: 31 Jul 2017

Cisco Umbrella

Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Worldwide IT Service and Incident Management Software 2017 Vendor Assessment
sponsored by Cherwell
WHITE PAPER: The IT service and incident management software market is increasingly growing more crowded and competitive than ever. Read this report to review the factors driving market growth, what to look for in a potential investment, and gain an overview of the top 12 vendors in the market.
Posted: 26 Jul 2017 | Published: 30 Jun 2017

Cherwell
26 - 50 of 1770 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement