IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
26 - 50 of 1618 Matches Previous Page  |  Next Page
How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

9 Best Practices to Build a Digital Business Architecture
sponsored by Axway
WHITE PAPER: APIs can help you leverage third-party development talent and encourage collaboration, but there are several security and performance issues you have to address in order to ensure responsible, effective use of APIs. Discover 9 best practices to optimize your digital business architecture with APIs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Axway

IoT Security: Have You Addressed These 10 Critical Issues?
sponsored by Axway
WHITE PAPER: Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

Axway

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential
sponsored by LogicNow
WHITE PAPER: This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

LogicNow

7 Things You Need to Know about Virtual Mobile Infrastructure
sponsored by Sierraware
WHITE PAPER: Trends like BYOD have forced IT departments tochange the way that they manage and secure endpoints. IT must rethink the way that they monitor andprotect business data, while still allowing users toaccess vital business applications. Access this white paper to learn seven keys to managing BYOD with virtual mobile infrastructure.
Posted: 06 Apr 2016 | Published: 23 Mar 2016

Sierraware

Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work
sponsored by Sierraware
WHITE PAPER: As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.
Posted: 05 Apr 2016 | Published: 30 Mar 2016

Sierraware

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow

Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Electronic Privacy Screens: Protect Your Data at the Source
sponsored by OptioLabs
WHITE PAPER: This white paper discusses how display security and breach detection solutions can protect against disclosures of information caused by over-the-shoulder observation and unattended workstations. Read on to discover the key features that you need to look for in a display security solution.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

OptioLabs

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Overcoming Data Sovereignty and Security Challenges with the Cloud
sponsored by PEER 1
WHITE PAPER: Access this valuable resource now and learn how to stay ahead of data residency laws, ensure you are storing data correctly, and safeguard your customer's data and ensure that its sovereignty remains intact.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

PEER 1

Top 5 IoT Security Questions for Manufacturers
sponsored by Microsoft
WHITE PAPER: The Internet of Things has introduced new security issues for manufacturers. This infographic reveals the top 5 essential questions you need to address in order to protect your connected devices and assets. Learn how to safely connect systems, devices, and other assets, as well as 4 other critical answers.
Posted: 31 Mar 2016 | Published: 31 Mar 2016

Microsoft

Overcome Security And Identity Management Challenges In Enterprise Mobility With The Right IT Infrastructure
sponsored by Microsoft
WHITE PAPER: Mobility is becoming an increasingly crucial tool in today's business landscape. Access this white paper to uncover the three key findings about risk management, security, and infrastructure that Forrester Research discovered during a study on enterprise mobility.
Posted: 31 Mar 2016 | Published: 30 Dec 2014

Microsoft

Facilitate HIPAA Compliance
sponsored by Avaya
WHITE PAPER: This resource discusses how HIPAA compliance applies to organizations that handle Protected Health Information.
Posted: 31 Mar 2016 | Published: 31 Dec 2014

Avaya

Next Generation Firewall Test Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Solving the Growing Complexities of Network Management: Network as a Service
sponsored by Rogers Communications, Inc.
WHITE PAPER: IT teams continue to struggle to keep up with new technologies and increasing bandwidth demands are only worsening the problem. Discover how to shift your IT departments focus from day-to-day maintenance toward productivity with Network as a Service.
Posted: 30 Mar 2016 | Published: 23 Mar 2016

Rogers Communications, Inc.

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Cloud-Hosted Desktops: Which Solution Is Right For You?
sponsored by UKFast
WHITE PAPER: Before you jump into a DaaS or VDI deployment, consult this white paper which details the differences between each strategy and helps you decide which is better suited for your business. You'll gain insight into the following features including, the benefits of cloud-hosted desktops, virtual desktop use cases, and more.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

UKFast

Research: Network is critial for IP Video Surveillance
sponsored by Avaya
WHITE PAPER: Many organizations that historically focused on securing the IT infrastructure have shifted their focus to physical security. Access this research to learn about the near future of IP video surveillance.
Posted: 29 Mar 2016 | Published: 29 Dec 2014

Avaya

Be More Secure With Micro-Segmentation
sponsored by VMware
WHITE PAPER: This short infographic specifically identifies one way that you can improve security within the confines of your data center. Explore how using micro-segmentation can help create partitions that will prevent attackers from rampaging through your data center.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

VMware
26 - 50 of 1618 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement