IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityWhite Papers (View All Report Types)
26 - 50 of 1711 Matches Previous Page  | Next Page
Defeat Malware and Botnet Infections with a DNS Firewall
sponsored by BlueCat
WHITE PAPER: This paper reveals a threat protection solution that can help you address any holes in enterprise security.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

BlueCat

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Hightail for Enterprise: Mobile Overview
sponsored by Hightail
WHITE PAPER: This white paper details how to work seamlessly from mobile platforms using Hightail.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Hightail

The Self-Service Password Reset Checklist
sponsored by Tools4ever
WHITE PAPER: This white paper will help your organization to determine whether investing in a self-service password reset solution is worth it, providing a checklist of issues that your company may encounter along the way and a number of solutions to save you time and money.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


4 Reasons You Need a High Performance ADC
sponsored by A10 Networks
WHITE PAPER: This infographic points out 4 reasons why you need a high performance ADC for your business.
Posted: 05 Dec 2014 | Published: 01 Nov 2014

A10 Networks

Gartner Evaluates 12 Web Access Management Solutions
sponsored by IBM
WHITE PAPER: This white paper from Gartner evaluates 12 leading Web access management solutions on criteria like customer experience, core goods and services, and pricing.
Posted: 05 Dec 2014 | Published: 15 Nov 2013

IBM

A SIEM Buyer’s Guide for Resourced-Constrained Security
sponsored by SolarWinds, Inc.
WHITE PAPER: Check out this buyer's guide to learn about the critical security and compliance capabilities that you need without breaking the bank on SIEM.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

SolarWinds, Inc.

Protection for Every Enterprise: How BlackBerry® Security Works
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by CommVault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

The Total Economic Impact of Druva inSync
sponsored by Druva Software
WHITE PAPER: Read this Forrester Total Economic Impact Study about a centralized console that improves data protection for mobile endpoints, drives cost savings, and improves productivity.
Posted: 04 Dec 2014 | Published: 31 Oct 2014

Druva Software

Vectra X-Series Deployment Guide
sponsored by Vectra Networks
WHITE PAPER: This deployment guide gives a brief overview of the deployment preparation, installation, and configuration of a Vectra X-series platform, which detects malware and cyber attacks at any phase.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vectra Networks

How to Build Defense in Depth Against Advanced Cyber Attacks with Vectra and Sandbox Security
sponsored by Vectra Networks
WHITE PAPER: This white paper introduces Vectra, a leading innovator in real-time detection of in-progress cyber attacks that complements sandbox security solutions to create an in-depth defense against advanced persistent threats.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Vectra Networks

Using Anomalies in Crash Reports to Detect Unknown Threats
sponsored by Websense
WHITE PAPER: In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.
Posted: 03 Dec 2014 | Published: 18 Feb 2013

Websense

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

Win the Race Against Time to Stay Ahead of Cybercriminals
sponsored by IBM
WHITE PAPER: Discover how IBM Security QRadar Incident Forensics can help enterprises investigate and gather evidence on breaches.
Posted: 03 Dec 2014 | Published: 08 Jul 2014

IBM

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive whitepaper now to learn about some ways you can reduce the costs, complexity, and administration resources of security for mid-sized businesses with a single solution for endpoint management.
Posted: 03 Dec 2014 | Published: 14 Oct 2014

IBM

5 Ways to Get Started with Big Data
sponsored by IBM
WHITE PAPER: Uncover the top 5 use cases that can be your first step into utilizing big data effectively.
Posted: 03 Dec 2014 | Published: 30 Jun 2014

IBM

Will Windows 10 make a Shift for IT?
sponsored by Vembu Technologies
WHITE PAPER: This resource highlights Windows 10's key features and how its making the shift to IT.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Vembu Technologies

Busting Myths About Mobility: Why the Dream of Mobility shouldn’t be a Security Nightmare for Highly Regulated Businesses
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at mobile security and why your business shouldn't have security nightmares. Read on to crack the common myths about mobility, and more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Dell, Inc. and Intel®

Cool Vendors in Application and Endpoint Security, 2014
sponsored by Digital Guardian
WHITE PAPER: This resource from Gartner evaluates 5 cutting-edge security vendors that are not necessarily market-proven, but are producing technologically sophisticated application and endpoint security products that early adopters may find highly promising.
Posted: 02 Dec 2014 | Published: 02 May 2014

Digital Guardian

How Box is Securing Business Information in the Cloud
sponsored by Box
WHITE PAPER: This white paper explains why the centralization of sensitive documents in the cloud can make them easier to monitor and secure.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Protecting Government Information While Reducing Complexity and Ongoing Cost
sponsored by Dell
WHITE PAPER: Access this white paper to discover how virtualization and cloud computing are creating secure end user access to desktop resources.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Dell
26 - 50 of 1711 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement